Sciweavers

634 search results - page 88 / 127
» Finding trendsetters in information networks
Sort
View
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
CHI
2011
ACM
14 years 3 months ago
Identifying social capital in the facebook interface
A number of studies have identified a robust relationship between the use of social network sites, particularly Facebook, and positive outcomes such as social capital. Social netw...
Christian Yoder, Fred Stutzman
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 12 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
NETWORK
2008
96views more  NETWORK 2008»
14 years 11 months ago
Enabling rapid wireless system composition through layer-2 discovery
Although small mobile computers have processors whose capabilities are increasing, often they still are resource constrained in terms of performing many common computing tasks. Co...
Shivani Sud, Roy Want, Trevor Pering, Barbara Rosa...
UIC
2007
Springer
15 years 6 months ago
Location-Based Recommendation System Using Bayesian User's Preference Model in Mobile Devices
As wireless communication advances, research on location-based services using mobile devices has attracted interest, which provides information and services related to user’s phy...
Moon-Hee Park, Jin-Hyuk Hong, Sung-Bae Cho