Sciweavers

759 search results - page 18 / 152
» What Can Be Implemented Anonymously
Sort
View
DCOSS
2005
Springer
14 years 3 months ago
Stably Computable Properties of Network Graphs
We consider a scenario in which anonymous, finite-state sensing devices are deployed in an ad-hoc communication network of arbitrary size and unknown topology, and explore what p...
Dana Angluin, James Aspnes, Melody Chan, Michael J...
SCN
2010
Springer
147views Communications» more  SCN 2010»
13 years 8 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
CASCON
2003
103views Education» more  CASCON 2003»
13 years 11 months ago
Spatialized audioconferencing: what are the benefits?
Audioconference participants often have difficulty identifying the voices of other conferees, especially in ad hoc groups of unfamiliar members. Simultaneous presentation of multi...
Ryan Kilgore, Mark H. Chignell, Paul Smith
CGI
2000
IEEE
14 years 2 months ago
To Gesture or Not to Gesture: What is the Question?
Computer synthesized characters are expected to make appropriate face, limb, and body gestures during communicative acts. We focus on non-facial movements and try to elucidate wha...
Norman I. Badler, Monica Costa, Liwei Zhao, Diane ...
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
14 years 10 months ago
FPGA: what's in it for a database?
While there seems to be a general agreement that next years' systems will include many processing cores, it is often overlooked that these systems will also include an increa...
Jens Teubner, René Müller