Sciweavers

506 search results - page 94 / 102
» Comments on Broadcast Channels
Sort
View
VRST
1999
ACM
14 years 2 months ago
Patterns of network and user activity in an inhabited television event
Inhabited Television takes traditional broadcast television and combines it with multiuser virtual reality, to give new possibilities for interaction and participation in and arou...
Chris Greenhalgh, Steve Benford, Michael P. Craven
ISADS
1999
IEEE
14 years 2 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ESEC
1999
Springer
14 years 2 months ago
A Component and Communication Model for Push Systems
We present a communication and component model for push systems. Surprisingly, despite the widespread use of many push services on the Internet, no such models exist. Our communica...
Manfred Hauswirth, Mehdi Jazayeri
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
14 years 1 months ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...
JCM
2006
60views more  JCM 2006»
13 years 9 months ago
A Harmful Interference Model for Unlicensed Device Operation in Licensed service Bands
Recent FCC proceedings have considered the notion of unlicensed device operation in licensed bands. Licensed users are concerned about harmful interference while unlicensed device ...
Timothy X. Brown