Sciweavers

1733 search results - page 79 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
ICASSP
2011
IEEE
14 years 5 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
WSDM
2012
ACM
301views Data Mining» more  WSDM 2012»
13 years 9 months ago
Learning evolving and emerging topics in social media: a dynamic nmf approach with temporal regularization
As massive repositories of real-time human commentary, social media platforms have arguably evolved far beyond passive facilitation of online social interactions. Rapid analysis o...
Ankan Saha, Vikas Sindhwani
ATAL
2009
Springer
15 years 8 months ago
Analyzing the performance of randomized information sharing
In large, collaborative, heterogeneous teams, team members often collect information that is useful to other members of the team. Recognizing the utility of such information and d...
Prasanna Velagapudi, Oleg A. Prokopyev, Katia P. S...
RE
2008
Springer
15 years 27 days ago
Design Science, Engineering Science and Requirements Engineering
For several decades there has been a debate in the computing sciences about the relative roles of design and empirical research, and about the contribution of design and research ...
Roel Wieringa, J. M. G. Heerkens
CHI
2007
ACM
16 years 1 months ago
Context & usability testing: user-modeled information presentation in easy and difficult driving conditions
A 2x2 enhanced Wizard-of-Oz experiment (N = 32) was conducted to compare two different approaches to presenting information to drivers in easy and difficult driving conditions. Da...
Jiang Hu, Andi Winterboer, Clifford Nass, Johanna ...