Sciweavers

17018 search results - page 72 / 3404
» From the How to the What
Sort
View
CIG
2005
IEEE
14 years 1 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
DGCI
2005
Springer
14 years 1 months ago
How to Obtain a Lattice Basis from a Discrete Projected Space
Nicolas Normand, Myriam Servieres, Jean-Pierre Gu&...
DIGRA
2005
Springer
14 years 1 months ago
How Serious are serious games? Some lessons from Infra-games
In this paper, the authors explore the possible contribution of serious games for advanced academic and/or professional learning in particular to support the decision-making and 1...
Geertje Bekebrede, Igor Mayer, Stijn-Pieter A. van...
SIGITE
2004
ACM
14 years 1 months ago
How information technology professionals keep from being outsourced or offshored
This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...
Ron Fulbright, Richard L. Routh
EUROCRYPT
2004
Springer
14 years 1 months ago
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis, Leonid Reyzin, Adam Smith