Sciweavers

1161 search results - page 206 / 233
» Group Message Authentication
Sort
View
78
Voted
ISI
2007
Springer
15 years 3 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 3 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communities...
Karine Barzilai-Nahon
79
Voted
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Impact of Social Types within Information Communities: Findings from Technical Newsgroups
We explored whether Fisher and Durrance’s [11] framework of information communities applies to online technical newsgroups and the impact of particular social types on informati...
Tammara Combs Turner, Karen E. Fisher
60
Voted
SRDS
2006
IEEE
15 years 3 months ago
Topology Sensitive Replica Selection
As the disks typically found in personal computers grow larger, protecting data by replicating it on a collection of “peer” systems rather than on dedicated high performance s...
Dmitry Brodsky, Michael J. Feeley, Norman C. Hutch...
PEWASUN
2006
ACM
15 years 3 months ago
Context-aware multicast routing scheme for disruption tolerant networks
: Disruption Tolerant Networks (DTNs) are emerging solutions to networks that experience frequent network partitions and large end-to-end delays. Several schemes have been proposed...
Peng Yang, Mooi Choo Chuah