Sciweavers

70 search results - page 11 / 14
» Detecting Deceptive Groups Using Conversations and Network A...
Sort
View
98
Voted
MOBIQUITOUS
2005
IEEE
15 years 4 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
CHI
2006
ACM
15 years 11 months ago
Talk to me: foundations for successful individual-group interactions in online communities
People come to online communities seeking information, encouragement, and conversation. When a community responds, participants benefit and become more committed. Yet interactions...
Jaime Arguello, Brian S. Butler, Elisabeth Joyce, ...
ESORICS
2010
Springer
14 years 9 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
ICASSP
2007
IEEE
15 years 5 months ago
A Multi-Subject, Dynamic Bayesian Networks (DBNS) Framework for Brain Effective Connectivity
As dynamic connectivity is shown essential for normal brain function and is disrupted in disease, it is critical to develop models for inferring brain effective connectivity from ...
Junning Li, Z. Jane Wang, Martin J. McKeown
CASCON
2007
106views Education» more  CASCON 2007»
15 years 20 days ago
Identifying active subgroups in online communities
As online communities proliferate, methods are needed to explore and capture patterns of activity within them. This paper focuses on the problem of identifying active subgroups wi...
Alvin Chin, Mark H. Chignell