Sciweavers

1668 search results - page 186 / 334
» Two Philosophical Applications of Algorithmic Information Th...
Sort
View
CJ
2006
123views more  CJ 2006»
13 years 8 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
JNCA
2007
69views more  JNCA 2007»
13 years 8 months ago
Specifying the intertwining of cooperation and autonomy in agent-based systems
Cooperation and autonomy are two antagonistic core variables of agent-based systems, and a key challenge in designing such systems is to balance these variables appropriately. Thi...
Gerhard Weiß, Matthias Nickles, Michael Rova...
BCSHCI
2009
13 years 6 months ago
From the gaming experience to the wider user experience
In this paper we discuss the different elements of the gaming experience and their relation to other concepts within HCI. The objective is to showcase how the different elements t...
Eduardo H. Calvillo Gámez, Paul A. Cairns, ...
CCS
2007
ACM
14 years 2 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
MOBICOM
2004
ACM
14 years 1 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra