Sciweavers

2025 search results - page 356 / 405
» Theory as Game: Designing the Game Game
Sort
View
PUC
2008
120views more  PUC 2008»
13 years 7 months ago
Technology scruples: why intimidation will not save the recording industry and how enchantment might
While the recording industry continues to lobby for increasingly draconian laws to protect their interests, users of digital technology continue to share files and copy protected ...
Mark Blythe, Peter C. Wright
AOSD
2009
ACM
13 years 6 months ago
Concept analysis for product line requirements
Traditional methods characterize a software product line's requirements using either functional or quality criteria. This appears to be inadequate to assess modularity, detec...
Nan Niu, Steve M. Easterbrook
IWQOS
2011
Springer
12 years 11 months ago
Advanced Quality-of-Service signaling for IP multicast
—Supporting Quality-of-Service resource reservations for IP multicast flows is especially advantageous for distributed multimedia applications like video conferencing, 3D teleim...
Roland Bless, Martin Röhricht
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 4 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
ICDT
2010
ACM
141views Database» more  ICDT 2010»
14 years 24 days ago
The Complexity of Rooted Phylogeny problems
Several computational problems in phylogenetic reconstruction can be formulated as restrictions of the following general problem: given a formula in conjunctive normal form where ...
Manuel Bodirsky, Jens K. Mueller