Sciweavers

2492 search results - page 438 / 499
» False-Name-Proofness in Social Networks
Sort
View
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
15 years 8 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
ACSC
2006
IEEE
15 years 8 months ago
A framework for visual data mining of structures
Visual data mining has been established to effectively analyze large, complex numerical data sets. Especially, the extraction and visualization of inherent structures such as hie...
Hans-Jörg Schulz, Thomas Nocke, Heidrun Schum...
AAAIDEA
2005
IEEE
15 years 7 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
HICSS
2005
IEEE
153views Biometrics» more  HICSS 2005»
15 years 7 months ago
Conversations in the Blogosphere: An Analysis "From the Bottom Up"
The "blogosphere" has been claimed to be a densely interconnected conversation, with bloggers linking to other bloggers, referring to them in their entries, and posting ...
Susan C. Herring, Inna Kouper, John C. Paolillo, L...
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
15 years 7 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...