Sciweavers

2421 search results - page 131 / 485
» Message from the Co-Chairs
Sort
View
CIA
2007
Springer
14 years 3 months ago
From Local Search to Global Behavior: Ad Hoc Network Example
We introduce the Consensual N-Player Prisoner’s Dilemma as a large-scale dilemma. We then present a framework for cooperative consensus formation in large-scale MAS under the N-P...
Osher Yadgar
EUROCRYPT
2010
Springer
14 years 2 months ago
A Simple BGN-Type Cryptosystem from LWE
We construct a simple public-key encryption scheme that supports polynomially many additions and one multiplication, similar to the cryptosystem of Boneh, Goh, and Nissim (BGN). S...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
CSCW
1998
ACM
14 years 1 months ago
The Dynamics of Mass Interaction
Usenet may be regarded as the world’s largest conversational application, with over 17,000 newsgroups and 3 million users. Despite its ubiquity and popularity, however, we know ...
Steve Whittaker, Loren G. Terveen, William C. Hill...
PRESENCE
2002
124views more  PRESENCE 2002»
13 years 8 months ago
Near-Field Virtual Audio Displays
In tasks that require listeners to monitor two or more simultaneous talkers, substantial performance benefits can be achieved by spatially separating the competing speech messages...
Douglas Brungart
IACR
2011
134views more  IACR 2011»
12 years 8 months ago
Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases
Zero knowledge sets (ZKS) [18] allow a party to commit to a secret set S and then to, non interactively, produce proofs for statements such as x ∈ S or x /∈ S. As recognized in...
Dario Catalano, Dario Fiore