Sciweavers

4922 search results - page 853 / 985
» Internet time out
Sort
View
DRM
2003
Springer
14 years 2 months ago
Analysis of security vulnerabilities in the movie production and distribution process
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some t...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
EUROCRYPT
2003
Springer
14 years 2 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
14 years 1 months ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
GI
2009
Springer
14 years 1 months ago
Presence Sensing Billboards
: The Out-of-Home (OOH) media markets currently rely on a plethora of methods and technologies for measuring their potential or real success. From nationwide interviews over statis...
Bernhard Wally, Alois Ferscha, Markus Lenger
ICEIS
2000
IEEE
14 years 1 months ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant