Sciweavers

5790 search results - page 720 / 1158
» Distributed programming with distributed authorization
Sort
View
INFOCOM
2011
IEEE
14 years 7 months ago
Hidden communication in P2P networks Steganographic handshake and broadcast
—We consider the question of how a conspiring subgroup of peers in a p2p network can find each other and communicate without provoking suspicion among regular peers or an author...
Raphael Eidenbenz, Thomas Locher, Roger Wattenhofe...
ISR
2011
14 years 6 months ago
Compatibility and Proprietary Standards: The Impact of Conversion Technologies in IT Markets with Network Effects
e from http://ssrn.com/abstract=980726 Acknowledgements: The authors thank Ramayya Krishnan, Marshall Van Alstyne, Senior Editor Sanjeev Dewan, the associate editor and referees fo...
Charles Zhechao Liu, Esther Gal-Or, Chris F. Kemer...
CSCW
2012
ACM
13 years 11 months ago
Technology-mediated contributions: editing behaviors among new wikipedians
The power-law distribution of participation characterizes a wide variety of technology-mediated social participation (TMSP) systems, and Wikipedia is no exception. A minority of a...
Judd Antin, Coye Cheshire, Oded Nov
CSCW
2012
ACM
13 years 11 months ago
Social coding in GitHub: transparency and collaboration in an open software repository
Social applications on the web let users track and follow the activities of a large number of others regardless of location or affiliation. There is a potential for this transpare...
Laura A. Dabbish, H. Colleen Stuart, Jason Tsay, J...
CSCW
2012
ACM
13 years 11 months ago
Designing a social network to support the independence of young adults with autism
Independence is key to a successful transition to adulthood for individuals with autism. Social support is a crucial factor for achieving adaptive self-help life skills. In this p...
Hwajung Hong, Jennifer G. Kim, Gregory D. Abowd, R...