Sciweavers

11580 search results - page 2076 / 2316
» Communication vs. Computation
Sort
View
175
Voted
CBSE
2011
Springer
14 years 4 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
178
Voted

Publication
270views
14 years 3 months ago
A Data Hiding Scheme Based on LBPROT Pattern
Texture classification is mainly used for segmentation of texture regions and content-based access to image databases. Lately these texture classification patterns have been appl...
E. E. Varsaki, V. Fotopoulos, A. N. Skodras
141
Voted
CSCW
2012
ACM
14 years 9 days ago
The personality of popular facebook users
We study the relationship between Facebook popularity (number of contacts) and personality traits on a large number of subjects. We test to which extent two prevalent viewpoints h...
Daniele Quercia, Renaud Lambiotte, David Stillwell...
140
Voted
TON
2012
13 years 7 months ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu
MMS
2012
13 years 7 months ago
Privacy-sensitive recognition of group conversational context with sociometers
Recognizing the conversational context in which group interactions unfold has applications in machines that support collaborative work and perform automatic social inference using ...
Dinesh Babu Jayagopi, Taemie Kim, Alex Pentland, D...
« Prev « First page 2076 / 2316 Last » Next »