Sciweavers

330 search results - page 64 / 66
» On the Notion of Pseudo-Free Groups
Sort
View
CCS
2009
ACM
14 years 4 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
AMT
2009
Springer
263views Multimedia» more  AMT 2009»
14 years 4 months ago
A Dynamic Trust Network for Autonomy-Oriented Partner Finding
The problem of partner finding is to identify which entities (agents) can provide requested services from a group of entities. It can be found in open and distributed environment...
Hongjun Qiu, Jiming Liu, Ning Zhong
FOCS
2007
IEEE
14 years 4 months ago
Covert Multi-Party Computation
In STOC’05, Ahn, Hopper and Langford introduced the notion of covert computation. A covert computation protocol is one in which parties can run a protocol without knowing if oth...
Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, ...
GLOBECOM
2007
IEEE
14 years 4 months ago
A Technique to Enhance Localization in the Presence of NLOS Errors
— In a wireless network (WN), the wireless devices generally localize themselves with the help of anchors that are pre-deployed in the network. Some of the techniques commonly us...
Satyajayant Misra, Weiyi Zhang, Guoliang Xue
GI
2007
Springer
14 years 3 months ago
Supporting Early Literacy with Augmented Books - Experiences with an Exploratory Study
: We here report on a study exploring the use of augmented books for early literacy education. Children aged 6-7 interacted alone and in pairs with an AR-book. The study was iterat...
Eva Hornecker, Andreas Dünser