Sciweavers

2421 search results - page 54 / 485
» Message from the Co-Chairs
Sort
View
CGI
2004
IEEE
13 years 11 months ago
From Continuous to Discrete Games
Computer games follow a scheme of continuous simulation, coupling the rendering phase and the simulation phase. That way of operation has disadvantages that can be avoided using a...
Inmaculada García, Ramón Mollá...
DBKDA
2009
IEEE
238views Database» more  DBKDA 2009»
13 years 11 months ago
MyMIDP: An JDBC Driver for Accessing MySQL from Mobile Devices
Cell phones are no longer merely used to make phone calls or to send short or multimedia messages. They more and more become information systems clients. Recent developments in th...
Hagen Höpfner, Jörg Schad, Sebastian Wen...
NETWORKING
2010
13 years 9 months ago
Efficient Recovery from False State in Distributed Routing Algorithms
Abstract--Malicious and misconfigured nodes can inject incorrect state into a distributed system, which can then be propagated system-wide as a result of normal network operation. ...
Daniel Gyllstrom, Sudarshan Vasudevan, Jim Kurose,...
FAC
2008
80views more  FAC 2008»
13 years 7 months ago
Verification of Mondex electronic purses with KIV: from transactions to a security protocol
The Mondex case study about the specification and refinement of an electronic purse as defined in the Oxford Technical Monograph PRG-126 has recently been proposed as a challenge f...
Dominik Haneberg, Gerhard Schellhorn, Holger Grand...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 6 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang