Sciweavers

6775 search results - page 1264 / 1355
» Diagnosis of Active Systems
Sort
View
FC
2004
Springer
89views Cryptology» more  FC 2004»
14 years 4 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost eļ¬...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
GI
2004
Springer
14 years 4 months ago
Towards Using the Full Human Potential in Games and Virtual Environments
: Humans have complex sensory and control capabilities. Only a few are used in standard games and virtual environments. Examples of games using interfaces beyond mouse, keyboard an...
Steffi Beckhaus
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
14 years 4 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
WWW
2010
ACM
14 years 4 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-proļ¬le attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
IEEEPACT
2003
IEEE
14 years 4 months ago
Constraint Graph Analysis of Multithreaded Programs
This paper presents a framework for analyzing the performance of multithreaded programs using a model called a constraint graph. We review previous constraint graph definitions fo...
Harold W. Cain, Mikko H. Lipasti, Ravi Nair
« Prev « First page 1264 / 1355 Last » Next »