Sciweavers

4242 search results - page 804 / 849
» For a science of group interaction
Sort
View
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
15 years 8 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
MOBILITY
2009
ACM
15 years 8 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...
SOUPS
2009
ACM
15 years 8 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
BIBE
2008
IEEE
160views Bioinformatics» more  BIBE 2008»
15 years 8 months ago
Parallel integration of heterogeneous genome-wide data sources
— Heterogeneous genome-wide data sources capture information on various aspects of complex biological systems. For instance, transcriptome, interactome and phenome-level informat...
Derek Greene, Kenneth Bryan, Padraig Cunningham
VR
2008
IEEE
128views Virtual Reality» more  VR 2008»
15 years 8 months ago
GVT: a platform to create virtual environments for procedural training
The use of Virtual Environments for Training is strongly stimulated by important needs for training on sensitive equipments. Yet, developing such an application is often done with...
Stéphanie Gerbaud, Nicolas Mollet, Franck G...