Sciweavers

2454 search results - page 346 / 491
» Privacy in the Information and Communications Technologies
Sort
View
70
Voted
WWW
2010
ACM
15 years 5 months ago
Modeling relationship strength in online social networks
Previous work analyzing social networks has mainly focused on binary friendship relations. However, in online social networks the low cost of link formation can lead to networks w...
Rongjing Xiang, Jennifer Neville, Monica Rogati
DELTA
2008
IEEE
15 years 4 months ago
Testing of a Highly Reconfigurable Processor Core for Dependable Data Streaming Applications
The advances of CMOS technology towards 45 nm, the high costs of ASIC design, power limitations and fast changing application requirements have stimulated the usage of highly reco...
Hans G. Kerkhoff, Jarkko J. M. Huijts
ICDIM
2007
IEEE
15 years 4 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel
CEAS
2007
Springer
15 years 4 months ago
Discovering Leadership Roles in Email Workgroups
Email is a key communication tool for collaborative workgroups. In this paper, we investigate how team leadership roles can be inferred from a collection of email messages exchang...
Vitor R. Carvalho, Wen Wu, William W. Cohen
SAINT
2006
IEEE
15 years 4 months ago
Content Management for Inter-Organizational Projects Using E-Mail Metaphor
Inter-organizational projects involve the creation, modification and management of content. Unless carefully handled, these overheads can cause the loss of mutual understanding. ...
Kosuke Nakatsuka, Toru Ishida