Sciweavers

784 search results - page 157 / 157
» What would they think
Sort
View
IJACDT
2011
125views more  IJACDT 2011»
14 years 8 months ago
Becoming Creative through Self Observation: A (Second Order) Cybernetic Learning Strategy for the Metaverse
This study wishes to describe some of the key components of an art educational domain entitled ground<c>, which is being developed specifically for three dimensional online ...
Elif E. Ayiter
184
Voted
ICDCN
2012
Springer
14 years 27 days ago
Economic Models for Cloud Service Markets
Cloud computing is a paradigm that has the potential to transform and revolutionalize the next generation IT industry by making software available to end-users as a service. A clou...
Ranjan Pal, Pan Hui
163
Voted
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 7 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
172
Voted
VAMOS
2007
Springer
15 years 11 months ago
A Plea for Help with Variability, in Two Acts
A short theatrical exaggeration (but not too much) which describes practical problems with variability as experienced by real-world software developers. Real issue, there are no p...
Reed Little, Randy Blohm