Sciweavers

2454 search results - page 334 / 491
» Privacy in the Information and Communications Technologies
Sort
View
NDSS
2002
IEEE
15 years 3 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
LREC
2010
290views Education» more  LREC 2010»
14 years 11 months ago
Non-verbal Signals for Turn-taking and Feedback
This paper concerns non-verbal communication, and describes especially the use of eye-gaze to signal turn-taking and feedback in conversational settings. Eye-gaze supports smooth ...
Kristiina Jokinen
67
Voted
EJIS
2006
105views more  EJIS 2006»
14 years 10 months ago
Activity-based design
In many types of activities, communicative and material activities are so intertwined that the one cannot be understood without taking the other into account. This is true of mari...
Peter Bøgh Andersen
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
14 years 10 months ago
An Agent-Based Best Effort Routing Technique for Load Balancing
Abstract. Several best effort schemes (next-hop routing) are used to transport the data in the Internet. Some of them do not perform flexible route computations to cope up with the...
Sunilkumar S. Manvi, Pallapa Venkataram
154
Voted
SEKE
2010
Springer
14 years 8 months ago
A Project Monitoring Cockpit Based On Integrating Data Sources in Open Source Software Development
— Many open source software (OSS) development projects use tools and models that come from heterogeneous sources. A project manager, who wants to analyze indicators for the state...
Stefan Biffl, Wikan Danar Sunindyo, Thomas Moser