Sciweavers

10038 search results - page 1875 / 2008
» Model Checking for Managers
Sort
View
IJWMC
2010
103views more  IJWMC 2010»
14 years 10 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
CORR
2011
Springer
160views Education» more  CORR 2011»
14 years 7 months ago
Provenance for Aggregate Queries
We study in this paper provenance information for queries with aggregation. Provenance information was studied in the context of various query languages that do not allow for aggr...
Yael Amsterdamer, Daniel Deutch, Val Tannen
145
Voted
CSCW
2011
ACM
14 years 7 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill
133
Voted
TMC
2011
164views more  TMC 2011»
14 years 7 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
WWW
2011
ACM
14 years 7 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
« Prev « First page 1875 / 2008 Last » Next »