Sciweavers

980 search results - page 27 / 196
» Analyzing Flickr groups
Sort
View
ATC
2007
Springer
15 years 6 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
97
Voted
MICCAI
2008
Springer
16 years 1 months ago
Group Statistics of DTI Fiber Bundles Using Spatial Functions of Tensor Measures
We present a framework for hypothesis testing of differences between groups of DTI fiber tracts. An anatomical, tract-oriented coordinate system provides a basis for estimating the...
Casey Goodlett, P. Thomas Fletcher, John H. Gilm...
ER
1998
Springer
130views Database» more  ER 1998»
15 years 4 months ago
Group Activity Database for Groupware Evolution
This paper proposes a new type of database for collaborative work. Known types of databases for collaborative work are databases of shared data and those of process data. A new typ...
Hiroyuki Tarumi, Tetsuya Matsuyama, Yahiko Kambaya...
WCRE
2007
IEEE
15 years 6 months ago
A Study of Consistent and Inconsistent Changes to Code Clones
Code Cloning is regarded as a threat to software maintenance, because it is generally assumed that a change to a code clone usually has to be applied to the other clones of the cl...
Jens Krinke
WSC
2007
15 years 2 months ago
Upgraded cellular automata based group-work interaction simulation
The simulation of group-work interaction is significant for Chinese enterprise organizational management. As a result, a cellular-automata based simulation model is put forward. T...
Dong Shengping, Hu Bin