Sciweavers

4744 search results - page 162 / 949
» Connected Computing
Sort
View
CSCW
2010
ACM
16 years 4 days ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 10 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
122
Voted
MSN
2007
Springer
15 years 9 months ago
Distributed Computation of Maximum Lifetime Spanning Subgraphs in Sensor Networks
Abstract. We present a simple and efficient distributed method for determining the transmission power assignment that maximises the lifetime of a data-gathering wireless sensor net...
Harri Haanpää, André Schumacher, ...
WETICE
2006
IEEE
15 years 9 months ago
Co-Presence Communities: Using Pervasive Computing to Support Weak Social Networks
Although the strongest social relationships feature most prominently in our lives, we also maintain a multitude of much weaker connections: the distant colleagues that we share a ...
Jamie Lawrence, Terry R. Payne, David De Roure
143
Voted
MOBIQUITOUS
2005
IEEE
15 years 8 months ago
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...
Ramiro Liscano, Kaining Wang