Sciweavers

CSCW
2012
ACM
12 years 6 days ago
Of joy and gender: emotional expression in online social networks
In this study, we analyzed the language use on Twitter personal exchanges as well as properties of the users’ networks, to study the influence of gender composition on expressio...
Funda Kivran-Swaine, Samuel Brody, Nicholas Diakop...
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 4 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
HCI
2011
12 years 8 months ago
Manual and Accelerometer Analysis of Head Nodding Patterns in Goal-oriented Dialogues
We studied communication patterns in face-to-face dialogues between people for the purpose of identifying conversation features that can be exploited to improve human-computer inte...
Masashi Inoue, Toshio Irino, Nobuhiro Furuyama, Ry...
MICRO
2010
IEEE
130views Hardware» more  MICRO 2010»
13 years 2 months ago
Pseudo-Circuit: Accelerating Communication for On-Chip Interconnection Networks
As the number of cores on a single chip increases with more recent technologies, a packet-switched on-chip interconnection network has become a de facto communication paradigm for ...
Minseon Ahn, Eun Jung Kim
SIGCSE
2002
ACM
167views Education» more  SIGCSE 2002»
13 years 4 months ago
Defensive climate in the computer science classroom
As part of an NSF-funded IT Workforce grant, the authors conducted ethnographic research to provide deep understanding to the learning environment of computer science classrooms. ...
Lecia Jane Barker, Kathy Garvin-Doxas, Michele H. ...
TC
1998
13 years 4 months ago
Realizing Common Communication Patterns in Partitioned Optical Passive Stars (POPS) Networks
—We consider the problem of realizing several common communication structures in the all-optical Partitioned Optical Passive Stars (POPS) topology. We show that, often, the obvio...
Greg Gravenstreter, Rami G. Melhem
TON
2008
102views more  TON 2008»
13 years 4 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
CASCON
1997
85views Education» more  CASCON 1997»
13 years 5 months ago
Fast detection of communication patterns in distributed executions
Understanding distributed applications is a tedious and di cult task. Visualizations based on process-time diagrams are often used to obtain a better understanding of the executio...
Thomas Kunz, Michiel F. H. Seuren
SC
1992
ACM
13 years 8 months ago
Scheduling Regular and Irregular Communication Patterns on the CM-5
In this paper, we study the communication characteristics of the CM-5 and the performance e ects of scheduling regular and irregular communication patterns on the CM-5. We conside...
Ravi Ponnusamy, Rajeev Thakur, Alok N. Choudhary, ...
ISI
2004
Springer
13 years 10 months ago
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information
Abstract. This work describes a methodology that can be used to identify structure and communication patterns within an organization based on e-mail data. The first step of the me...
Petros Drineas, Mukkai S. Krishnamoorthy, Michael ...