Sciweavers

17018 search results - page 3287 / 3404
» From the How to the What
Sort
View
USS
2008
13 years 11 months ago
The Practical Subtleties of Biometric Key Generation
The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been s...
Lucas Ballard, Seny Kamara, Michael K. Reiter
USS
2008
13 years 11 months ago
The Case for Networked Remote Voting Precincts
Voting in national elections from the comfort of one's home computer may never be practical or secure, but we argue that remote network voting can be both practical and secur...
Daniel Sandler, Dan S. Wallach
ACMACE
2008
ACM
13 years 11 months ago
BragFish: exploring physical and social interaction in co-located handheld augmented reality games
In this paper, we present our research on social interaction in colocated handheld augmented reality (AR) games. These games are characterized by shared physical spaces that promo...
Yan Xu, Maribeth Gandy, Sami Deen, Brian Schrank, ...
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
13 years 11 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
ATAL
2008
Springer
13 years 11 months ago
Adaptive Kanerva-based function approximation for multi-agent systems
In this paper, we show how adaptive prototype optimization can be used to improve the performance of function approximation based on Kanerva Coding when solving largescale instanc...
Cheng Wu, Waleed Meleis
« Prev « First page 3287 / 3404 Last » Next »