Sciweavers

324 search results - page 16 / 65
» Robots make computer science personal
Sort
View
MOBIHOC
2005
ACM
14 years 7 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
AGS
2009
Springer
14 years 2 months ago
Two Case Studies for Jazzyk BSM
Recently, we introduced Behavioural State Machines (BSM ), a novel programming framework for development of cognitive agents with Jazzyk, its associated programming language and in...
Michael Köster, Peter Novák, David Mai...
CSCW
2006
ACM
13 years 11 months ago
Strangers and friends: collaborative play in world of warcraft
We analyze collaborative play in an online video game, World of Warcraft, the most popular personal computer game in the United States, with significant markets in Asia and Europe...
Bonnie A. Nardi, Justin Harris
MINENET
2005
ACM
14 years 29 days ago
Identifying BGP routing table transfers
BGP routing updates collected by monitoring projects such as RouteViews and RIPE have been a vital source to our understanding of the global routing system. The updates logged by ...
Beichuan Zhang, Vamsi Kambhampati, Mohit Lad, Dani...
RECSYS
2009
ACM
14 years 1 months ago
An incentive-based architecture for social recommendations
We present an incentive-based architecture for providing recommendations in a social network. We maintain a distinct reputation system for each individual and we rely on users to ...
Rajat Bhattacharjee, Ashish Goel, Konstantinos Kol...