Sciweavers

5009 search results - page 993 / 1002
» Mapping Human Networks
Sort
View
CEAS
2008
Springer
14 years 11 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
ACCV
2006
Springer
14 years 11 months ago
Learning Multi-category Classification in Bayesian Framework
Abstract. We propose an algorithm for Sparse Bayesian Classification for multi-class problems using Automatic Relevance Determination(ARD). Unlike other approaches which treat mult...
Atul Kanaujia, Dimitris N. Metaxas
HT
2010
ACM
14 years 11 months ago
Capturing implicit user influence in online social sharing
Online social sharing sites are becoming very popular nowadays among Web users, who use these sites to share their favourite items and to discover interesting and useful items fro...
Ching-man Au Yeung, Tomoharu Iwata
CSCW
2008
ACM
14 years 11 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
DGO
2007
121views Education» more  DGO 2007»
14 years 11 months ago
Social capital and ICT adoption in the public sector
Although the research domain on social capital and the adoption of Information and Communication Technologies (ICTs) is relatively immature, there is a fast growing body of eviden...
Noor Huijboom