Sciweavers

1177 search results - page 163 / 236
» A Theory of Role Composition
Sort
View
96
Voted
CSCW
2010
ACM
15 years 9 months ago
Reading between the lines: linguistic cues to deception in online dating profiles
This study investigates whether deception in online dating profiles is detectable through a linguistic approach, which assumes that liars nonconsciously produce different word pat...
Catalina L. Toma, Jeffrey T. Hancock
123
Voted
ICDE
2010
IEEE
249views Database» more  ICDE 2010»
15 years 7 months ago
PARINET: A tunable access method for in-network trajectories
— In this paper we propose PARINET, a new access method to efficiently retrieve the trajectories of objects moving in networks. The structure of PARINET is based on a combination...
Iulian Sandu Popa, Karine Zeitouni, Vincent Oria, ...
129
Voted
CHI
2010
ACM
15 years 7 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield
AINA
2009
IEEE
15 years 7 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
77
Voted
ICRA
2009
IEEE
151views Robotics» more  ICRA 2009»
15 years 7 months ago
A framework for modeling steady turning of robotic fish
— In this paper we present a novel framework for computing the steady turning motion of a robotic fish undergoing periodic body and/or tail deformation. Taking the turning radiu...
Qingsong Hu, Dawn R. Hedgepeth, Lihong Xu, Xiaobo ...