|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 379 occurrences of 238 keywords
|
|
|
Results
Found 755 publication records. Showing 755 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
136 | Nan Zhang, Yuanchun Shi, Bin Chang |
Impact of Node Cheating on Gossip-Based Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 1068-1077, 2006, Springer, 3-540-36679-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
node cheating, reliable, gossip-based protocol, ALM |
136 | Judy Sheard, Martin Dick |
Influences on cheating practice of graduate students in IT courses: what are the factors? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 8th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2003, Thessaloniki, Greece, June 30 - July 2, 2003, pp. 45-49, 2003, ACM, 1-58113-672-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
information technology, cheating, plagiarism, graduate students |
133 | Josef Pieprzyk, Xian-Mo Zhang |
Cheating Prevention in Linear Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 121-135, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection |
112 | Robert Law |
Using student blogs for documentation in software development projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 16th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2011, Darmstadt, Germany, June 27-29, 2011, pp. 366, 2011, ACM, 978-1-4503-0697-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
110 | Henry Been-Lirn Duh, Vivian Hsueh-hua Chen |
Cheating Behaviors in Online Gaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (12) ![In: Online Communities and Social Computing, Third International Conference, OCSC 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 567-573, 2009, Springer, 978-3-642-02773-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Online game cheating, cheating frameworks, online game fairness |
103 | Jeff Jianxin Yan, Brian Randell |
A systematic classification of cheating in online games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 4th Workshop on Network and System Support for Games, NETGAMES 2005, Hawthorne, New York, USA, October 10-11, 2005, pp. 1-9, 2005, ACM, 1-59593-156-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
online computer games, security, taxonomy, cheating |
103 | Josef Pieprzyk, Xian-Mo Zhang |
Cheating Prevention in Secret Sharing over GF(pt). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 79-90, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Nonlinear Secret Sharing, Cheating Immunity, Secret Sharing |
92 | Wenping Ma 0002, Fu Tai Zhang |
New Methods to Construct Cheating Immune Multisecret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 384-394, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing |
86 | Stefano Ferretti, Marco Roccetti |
AC/DC: an algorithm for cheating detection by cheating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 16th International Workshop, NOSSDAV 2006, Newport, Rhode Island, USA, November 22-23, 2006, Proceedings, pp. 23, 2006, ACM, 1-59593-285-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
peer-to-peer, synchronization, online games, cheating |
84 | Toshinori Araki |
Efficient (k, n) Threshold Secret Sharing Schemes Secure Against Cheating from n-1 Cheaters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 133-142, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
84 | Xian-Mo Zhang, Josef Pieprzyk |
Cheating Immune Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 144-149, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
80 | Steven Daniel Webb, Sieteng Soh |
Cheating in networked computer games: a review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMEA ![In: Proceedings of the Second International Conference on Digital Interactive Media in Entertainment and Arts, DIMEA 2007, 19-21 September 2007, Perth, Western Australia, pp. 105-112, 2007, ACM, 978-1-59593-708-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
networked computer games, peer-to-peer, client/server, cheating |
80 | Ryan Porter, Yoav Shoham |
On cheating in sealed-bid auctions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), San Diego, California, USA, June 9-12, 2003, pp. 76-84, 2003, ACM, 1-58113-679-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
game theory, cheating, sealed-bid auctions |
80 | Judy Sheard, Martin Dick, Selby Markham, Ian MacDonald, Meaghan Walsh |
Cheating and plagiarism: perceptions and practices of first year IT students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 7th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2002, Aarhus, Denmark, June 24-28, 2002, pp. 183-187, 2002, ACM, 1-58113-499-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
information technology, cheating, plagiarism, undergraduates |
73 | Peter Laurens, Richard F. Paige, Phillip J. Brooke, Howard Chivers |
A Novel Approach to the Detection of Cheating in Multiplayer Online Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 12th International Conference on Engineering of Complex Computer Systems (ICECCS 2007), 10-14 July 2007, Auckland, New Zealand, pp. 97-106, 2007, IEEE Computer Society, 978-0-7695-2895-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
73 | Roberto De Prisco, Alfredo De Santis |
Cheating Immune (2, n)-Threshold Visual Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 216-228, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
69 | Wen Ping Ma, Moon Ho Lee |
New Methods to Construct Cheating Immune Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 79-86, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Quadratic Function, Balanced Function, Cheating Immune Function, MDS Code |
67 | Siu Fung Yeung, John C. S. Lui |
Dynamic Bayesian approach for detecting cheats in multi-player online games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 14(4), pp. 221-236, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Huey-Ing Liu, Yun-Ting Lo |
DaCAP - A Distributed Anti-Cheating Peer to Peer Architecture for Massive Multiplayer On-line Role Playing Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 584-589, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
P2P, MMOG, MMORPG |
62 | Satoshi Obana, Toshinori Araki |
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 364-379, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Josef Pieprzyk, Xian-Mo Zhang |
Constructions of Cheating Immune Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 226-243, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
60 | Yanyan Zhang |
A Multisecret Sharing Threshold Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 279-284, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dealer cheating, multisecret sharing, participant cheating, discrete logarithm problem, threshold scheme |
58 | Stefano Ferretti |
Cheating detection through game time modeling: A better way to avoid time cheats in P2P MOGs? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 37(3), pp. 339-363, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Peer-to-peer, Multiplayer online games, Cheating detection |
58 | Yong Cui 0001, Dan Li 0001, Jianping Wu |
Impact of Buffer Map Cheating on the Streaming Quality in DONet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part IV, pp. 817-824, 2007, Springer, 978-3-540-72589-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DONet, Buffer Map Cheating, Selfish |
58 | Stefano Ferretti, Marco Roccetti |
Game time modelling for cheating detection in P2P MOGs: a case study with a fast rate cheat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 5th Workshop on Network and System Support for Games, NETGAMES 2006, Singapore, October 30-31, 2006, pp. 35, 2006, ACM, 1-59593-589-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
peer-to-peer, synchronization, online games, cheating |
58 | Kang Li 0001, Shanshan Ding, Doug McCreary, Steve Webb |
Analysis of state exposure control to prevent cheating in online games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 14th International Workshop, NOSSDAV 2004, Cork, Ireland, June 16-18, 2004, Proceedings, pp. 140-145, 2004, ACM, 1-58113-801-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anti-cheating, online games |
52 | Josh Goodman, Clark Verbrugge |
A peer auditing scheme for cheat elimination in MMOGs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, NETGAMES 2008, Worcester, Massachusetts, USA, October 21-22, 2008, pp. 9-14, 2008, ACM, 978-1-60558-132-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
peer auditing, peer to peer, computer games, network model, trust model, cheating |
52 | Josef Pieprzyk, Xian-Mo Zhang |
Ideal Threshold Schemes from MDS Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 253-263, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Cheating Detection and Identification, Secret Sharing, Threshold Schemes |
50 | Chi-Ming Hu, Wen-Guey Tzeng |
Cheating Prevention in Visual Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 16(1), pp. 36-45, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Gwoboa Horng, Tzungher Chen, Du-shiau Tsai |
Cheating in Visual Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 38(2), pp. 219-236, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A62 |
50 | Christian Mönch, Gisle Grimen, Roger Midtstraum |
Protecting online games against cheating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 5th Workshop on Network and System Support for Games, NETGAMES 2006, Singapore, October 30-31, 2006, pp. 20, 2006, ACM, 1-59593-589-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Dan Li 0001, Jianping Wu, Yong Cui 0001, Jiangchuan Liu, Ke Xu 0002 |
Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 844-853, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Jouni Smed, Harri Hakonen |
Preventing Look-Ahead Cheating with Active Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computers and Games ![In: Computers and Games, 4th International Conference, CG 2004, Ramat-Gan, Israel, July 5-7, 2004, Revised Papers, pp. 301-315, 2004, Springer, 3-540-32488-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Patric Kabus, Wesley W. Terpstra, Mariano Cilia, Alejandro P. Buchmann |
Addressing cheating in distributed MMOGs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 4th Workshop on Network and System Support for Games, NETGAMES 2005, Hawthorne, New York, USA, October 10-11, 2005, pp. 1-6, 2005, ACM, 1-59593-156-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
distributed systems, cheating, massively multiplayer online gaming |
47 | David W. Petr, Ann Demirtjis |
How to encourage cheating with virtual path policing in ATM networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, pp. 225, 1995, IEEE Computer Society, 0-8186-7180-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
virtual path policing, virtual channel policing, usage parameter control, peak rate, sustainable rate policer, leaky bucket algorithm, noncompliant traffic, UPC function, compliant users, noncompliant users, asynchronous transfer mode, ATM networks, Ethernet, telecommunication traffic, cheating, variable bit rate traffic |
45 | Reid Kerr, Robin Cohen |
Smart cheaters do prosper: defeating trust and reputation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 993-1000, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
electronic marketplaces, trust and reputation |
45 | Nathaniel E. Baughman, Marc Liberatore, Brian Neil Levine |
Cheat-proof playout for centralized and peer-to-peer gaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 15(1), pp. 1-13, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, gaming, peer-to-peer networking, multimedia communication |
45 | Satoshi Hada |
Zero-Knowledge and Code Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 443-457, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
41 | Bei Di Chen, Muthucumaru Maheswaran |
A cheat controlled protocol for centralized online multiplayer games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 3rd Workshop on Network and System Support for Games, NETGAMES 2004, Portland, Oregon, USA, August 30, 2004, pp. 139-143, 2004, ACM, 1-58113-942-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cheat prevention, time cheating, multiplayer online games |
41 | Josef Pieprzyk, Xian-Mo Zhang |
Ideal Threshold Schemes from Orthogonal Arrays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 469-479, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Orthogonal Arrays, Nonlinear Functions, Threshold Secret Sharing, Cheating Detection |
39 | Chien-Chung Huang |
Cheating to Get Better Roommates in a Random Stable Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACS ![In: STACS 2007, 24th Annual Symposium on Theoretical Aspects of Computer Science, Aachen, Germany, February 22-24, 2007, Proceedings, pp. 453-464, 2007, Springer, 978-3-540-70917-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Stefano Arteconi, David Hales, Özalp Babaoglu |
Greedy Cheating Liars and the Fools Who Believe Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOA ![In: Engineering Self-Organising Systems, 4th International Workshop, ESOA 2006, Hakodate, Japan, May 9, 2006, Revised and Invited Papers, pp. 161-175, 2006, Springer, 978-3-540-69867-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | David J. Hand, Niall M. Adams, Nick A. Heard |
Pattern Discovery Tools for Detecting Cheating in Student Coursework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Local Pattern Detection ![In: Local Pattern Detection, International Seminar, Dagstuhl Castle, Germany, April 12-16, 2004, Revised Selected Papers, pp. 39-52, 2004, Springer, 3-540-26543-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Ying Xiao, Winfried Just |
A Possible Mechanism of Repressing Cheating Mutants in Myxobacteria. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation - GECCO 2003, Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings, Part I, pp. 154-155, 2003, Springer, 3-540-40602-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Gregory J. Conti, James Caroland |
Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(4), pp. 48-51, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
hacker mindset, adversary mindset, cheating exercises, ethics, cheating |
35 | Ch. Rupa 0001, P. S. Avadhani |
Message Encryption Scheme Using Cheating Text. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 470-474, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cheating Text, CPT, 64-bit chaining variables, Hash Functions, RIF |
35 | Anton Nijholt |
Playing and Cheating in Ambient Entertainment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Entertainment Computing - ICEC 2007, 6th International Conference, Shanghai, China, September 15-17, 2007, Proceedings, pp. 415-420, 2007, Springer, 978-3-540-74872-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
nonverbal interaction, Entertainment computing, cheating |
34 | Shaomin Zhang, Xiayan Zhang, Baoyi Wang |
History and Future Information Based Trust Model in C2C E-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 491-494, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Giovanni Di Crescenzo |
Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOON ![In: Computing and Combinatorics, 15th Annual International Conference, COCOON 2009, Niagara Falls, NY, USA, July 13-15, 2009, Proceedings, pp. 127-137, 2009, Springer, 978-3-642-02881-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Bare Public-Key Model, Complexity Assumptions, Round Complexity, Zero-Knowledge Protocols, Concurrent Zero-Knowledge |
34 | Kui Wu 0001, Dennis Dreef, Bo Sun 0001, Yang Xiao 0001 |
Secure data aggregation without persistent cryptographic operations in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Rakesh Agrawal 0001, Evimaria Terzi |
On Honesty in Sovereign Information Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT 2006, 10th International Conference on Extending Database Technology, Munich, Germany, March 26-31, 2006, Proceedings, pp. 240-256, 2006, Springer, 3-540-32960-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Felix C. Freiling, Maurice Herlihy, Lucia Draque Penso |
Optimal Randomized Fair Exchange with Secret Shared Coins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 9th International Conference, OPODIS 2005, Pisa, Italy, December 12-14, 2005, Revised Selected Papers, pp. 61-72, 2005, Springer, 3-540-36321-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Carolee Stewart-Gardiner, David G. Kay, Joyce Currie Little, Joseph D. Chase, John Fendrich, Laurie A. Williams, Ursula Wolz |
Collaboration vs plagiarism in computer science programming courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 32rd SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2001, Charlotte, North Carolina, USA, 2001, pp. 406-407, 2001, ACM, 1-58113-329-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Dror Lapidot, Adi Shamir |
A One-Round, Two-Prover, Zero-Knowledge Protocol for NP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 213-224, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
33 | Sedat Yazici, Hatice Yildiz Durak, Beyza Aksu Dünya, Burcu Sentürk |
Online versus face-to-face cheating: The prevalence of cheating behaviours during the pandemic compared to the pre-pandemic among Turkish University students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Assist. Learn. ![In: J. Comput. Assist. Learn. 39(1), pp. 231-254, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Leslie Ching Ow Tiong, HeeJeong Jasmine Lee |
E-cheating Prevention Measures: Detection of Cheating at Online Examinations Using Deep Learning Approach - A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2101.09841, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
33 | Jyotirmoy Pramanik, Sabyasachi Dutta, Partha Sarathi Roy 0001, Avishek Adhikari |
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 169-184, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
33 | Cale J. Passmore, Matthew K. Miller 0001, Jun Liu, Cody J. Phillips 0002, Regan L. Mandryk |
A Cheating Mood: The Emotional and Psychological Benefits of Cheating in Single-Player Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI PLAY ![In: CHI PLAY '20: The Annual Symposium on Computer-Human Interaction in Play, Virtual Event, Canada, November 2-4, 2020, pp. 58-70, 2020, ACM, 978-1-4503-8074-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
33 | Ziqian Yuan, Wenhui Zhang, Huijuan Fu, Zhixiao Tu |
A PageRank-improved ranking algorithm based on cheating similarity and cheating relevance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: 16th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2017, Wuhan, China, May 24-26, 2017, pp. 257-263, 2017, IEEE Computer Society, 978-1-5090-5507-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
33 | Stefano De Paoli, Aphra Kerr |
The Cheating Assemblage in MMORPGs: Toward a sociotechnical description of cheating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DiGRA Conference ![In: Proceedings of the 2009 DiGRA International Conference: Breaking New Ground: Innovation in Games, Play, Practice and Theory, DiGRA 2009, London, UK, September 1-4, 2009, 2009, Digital Games Research Association. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
33 | Xin Xiao, Yuanchun Shi, Yun Tang, Nan Zhang |
Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 91-B(9), pp. 2856-2863, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, Yuzhuo Zhong |
An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1716-1721, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Michael Stepp, Beth Simon |
Introductory computing students' conceptions of illegal student-student collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 295-299, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
academic integrity, cs1, cheating, plagiarism |
30 | Kuan-Ta Chen, Hsing-Kuo Kenneth Pao, Hong-Chung Chang |
Game bot identification based on manifold learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, NETGAMES 2008, Worcester, Massachusetts, USA, October 21-22, 2008, pp. 21-26, 2008, ACM, 978-1-60558-132-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
classification, SVM, trajectory, online games, kNN, cheating, isomap |
30 | Steven Daniel Webb, Sieteng Soh, Jerry L. Trahan |
Secure Referee Selection for Fair and Responsive Peer-to-Peer Gaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADS ![In: 22st International Workshop on Principles of Advanced and Distributed Simulation, PADS 2008, Roma, Italy, June 3-6, 2008, pp. 63-71, 2008, IEEE Computer Society, 978-0-7695-3159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
referee selection, security, peer-to-peer, MMOG, network game, cheating |
30 | Kuan-Ta Chen, Andrew Liao, Hsing-Kuo Kenneth Pao, Hao-Hua Chu |
Game Bot Detection Based on Avatar Trajectory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Entertainment Computing - ICEC 2008, 7th International Conference, Pittsburgh, PA, USA, September 25-27, 2008. Proceedings, pp. 94-105, 2008, Springer, 978-3-540-89221-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Online Games, User Behavior, Supervised Classification, Cheating Detection, Quake |
30 | Wenliang Du, Michael T. Goodrich |
Searching for High-Value Rare Events with Uncheatable Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 122-137, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, Grid computing, obfuscation, cheating, cryptographic hash functions |
30 | Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanjan Saha |
Mitigating information exposure to cheaters in real-time strategy games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 15th International Workshop, NOSSDAV 2005, Stevenson, Washington, USA, June 13-14, 2005, Proceedings, pp. 7-12, 2005, ACM, 1-58113-987-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
peer-to-peer, games, cheating |
30 | Jeffrey L. Popyack, Nira Herrmann, Paul Zoski, Bruce W. Char, Christopher D. Cera, Robert N. Lass |
Academic dishonesty in a high-tech environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 34th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2003, Reno, Nevada, USA, February 19-23, 2003, pp. 357-358, 2003, ACM, 1-58113-648-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
academic dishonesty, tools, detection, cheating, plagiarism |
30 | Weiliang Zhao, Vijay Varadharajan, Yi Mu 0001 |
Fair On-line Gambling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 394-400, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
fair on-line gambling, fair electronic gambling scheme, gambling outcome, optimal fair exchange metho, gambling message exchange, off-line Trusted Third Party, Internet, Internet, transaction processing, entertainment, security of data, cheating, payment, financial data processing |
28 | Murtuza Jadliwala, Sheng Zhong 0002, Shambhu J. Upadhyaya, Chunming Qiao, Jean-Pierre Hubaux |
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 9(6), pp. 810-823, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
distance-based localization, security, Wireless networks |
28 | Walter Quattrociocchi, Mario Paolucci, Rosaria Conte |
Image and Reputation Coping Differently with Massive Informational Cheating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSKS (1) ![In: Visioning and Engineering the Knowledge Society. A Web Science Perspective, Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings, pp. 574-583, 2009, Springer, 978-3-642-04753-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Szymon Szott, Marek Natkaniec, Andrzej R. Pach |
Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-hoc, Mobile and Wireless Networks, 7th International Conference, ADHOC-NOW 2008, Sophia-Antipolis, France, September 10-12, 2008, Proceedings, pp. 176-188, 2008, Springer, 978-3-540-85208-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
misbehaviour, Ad-hoc networks, IEEE 802.11e |
28 | Toshinori Araki, Satoshi Obana |
Flaws in Some Secret Sharing Schemes Against Cheating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 122-132, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Chien-Chung Huang |
Cheating by Men in the Gale-Shapley Stable Matching Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA 2006, 14th Annual European Symposium, Zurich, Switzerland, September 11-13, 2006, Proceedings, pp. 418-431, 2006, Springer, 3-540-38875-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Chia-Mu Yu, Chun-Shien Lu |
Robust non-interactive zero-knowledge watermarking scheme against cheating prover. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 103-110, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ambiguity attack, zero-knowledge detection, security, robustness, watermark |
28 | Ying-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, Larry Korba |
Online Gaming Cheating and Security Issue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 518-523, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Chen Chang 0001, Chao-Wen Chan |
Detecting Dealer Cheating in Secret Sharing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 24th International Computer Software and Applications Conference (COMPSAC 2000), 25-28 October 2000, Taipei, Taiwan, pp. 449-453, 2000, IEEE Computer Society, 0-7695-0792-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery |
28 | Hossein Ghodosi, Josef Pieprzyk |
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 129-134, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures |
28 | Wakaha Ogata, Kaoru Kurosawa |
Optimum Secret Sharing Scheme Secure against Cheating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, pp. 200-211, 1996, Springer, 3-540-61186-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
28 | Tal Rabin |
Robust Sharing of Secrets When the Dealer is Honest or Cheating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 41(6), pp. 1089-1109, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
28 | Marco Carpentieri, Alfredo De Santis, Ugo Vaccaro |
Size of Shares and Probability of Cheating in Threshold Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 118-125, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
28 | Don Coppersmith |
Cheating at Mental Poker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings, pp. 104-107, 1985, Springer, 3-540-16463-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
22 | Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, Jinhui Xu 0001 |
Towards a theory for securing time synchronization in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 201-212, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, approximation algorithms, time synchronization |
22 | Phillip G. Bradford, Sunju Park, Michael H. Rothkopf, Heejin Park |
Protocol completion incentive problems in cryptographic Vickrey auctions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 8(1-2), pp. 57-77, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptographic Vickrey actions, Bidder incentives, Yao’s millionaires’ protocol |
22 | Giovanni Di Crescenzo, Helger Lipmaa |
3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 19th International Symposium, ISAAC 2008, Gold Coast, Australia, December 15-17, 2008. Proceedings, pp. 615-627, 2008, Springer, 978-3-540-92181-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Zero-knowledge arguments, resettable zero-knowledge, resettable soundness, bare public-key model for zero-knowledge protocols |
22 | Arlo Faria, Nelson Morgan |
When a mismatch can be good: large vocabulary speech recognition trained with idealized tandem features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1574-1577, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
tandem, feature extraction, speech recognition, multi-layer perceptron, acoustic modeling |
22 | Jared Jardine, Daniel Zappala |
A hybrid architecture for massively multiplayer online games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, NETGAMES 2008, Worcester, Massachusetts, USA, October 21-22, 2008, pp. 60-65, 2008, ACM, 978-1-60558-132-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Cédric Fournet, Nataliya Guts, Francesco Zappa Nardelli |
A Formal Implementation of Value Commitment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 17th European Symposium on Programming, ESOP 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 383-397, 2008, Springer, 978-3-540-78738-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang |
Delaunay State Management for Large-Scale Networked Virtual Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 14th International Conference on Parallel and Distributed Systems, ICPADS 2008, Melbourne, Victoria, Australia, December 8-10, 2008, pp. 781-786, 2008, IEEE Computer Society, 978-0-7695-3434-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Feng Li, Jianwei Shang, Daxing Li |
A Proactive Secure Multisecret Sharing Threshold Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 105-110, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multisecret sharing, discrete logarithm problem, threshold scheme, proactive security |
22 | Rui Sun, Ke Xu 0002, Zhao Li, Li Zhang |
A Strategyproof Protocol in Mesh-Based Overlay Streaming System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM (1) ![In: Advances in Multimedia Modeling, 13th International Multimedia Modeling Conference, MMM 2007, Singapore, January 9-12, 2007. Proceedings, Part I, pp. 495-504, 2007, Springer, 978-3-540-69421-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Amy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague |
A Secure Event Agreement (SEA) protocol for peer-to-peer games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 34-41, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Tim Leinmüller, Christian Maihöfer, Elmar Schoch, Frank Kargl |
Improved security in geographic ad hoc routing through autonomous position verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the Third International Workshop on Vehicular Ad Hoc Networks, VANET 2006, Los Angeles, CA, USA, September 29, 2007, pp. 57-66, 2006, ACM, 1-59593-540-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
position verification, security, geographic routing, vehicular ad hoc networks (VANETs) |
22 | Adam Wierzbicki |
Trust Enforcement in Peer-to-Peer Massive Multi-player Online Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE, OTM Confederated International Conferences, CoopIS, DOA, GADA, and ODBASE 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1163-1180, 2006, Springer, 3-540-48274-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Lifang Peng, Zhong Chen, Qi Li 0036 |
Model and method for evaluating creditability of C2C electronic trade. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 244-249, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
C2C, trust, analytic hierarchy process, electronic trade, fuzzy synthetic evaluation |
22 | Mohammad Shirali-Shahreza |
M-Quiz by SMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, ICALT 2006, Kerkrade, The Netherlands, July 5-7, 2006, pp. 726-729, 2006, IEEE Computer Society, 0-7695-2632-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Darshan Purandare, Ratan K. Guha |
Preferential and Strata based P2P Model: Selfishness to Altruism and Fairness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 12th International Conference on Parallel and Distributed Systems, ICPADS 2006, Minneapolis, Minnesota, USA, July 12-15, 2006, pp. 561-570, 2006, IEEE Computer Society, 0-7695-2612-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Bei Di Chen, Muthucumaru Maheswaran |
A Fair Synchronization Protocol with Cheat Proofing for Decentralized Online Multiplayer Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August - 1 September 2004, Cambridge, MA, USA, pp. 372-375, 2004, IEEE Computer Society, 0-7695-2242-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee |
Secure Online Examination Architecture Based on Distributed Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 534-537, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 755 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ >>] |
|