Sciweavers

422 search results - page 63 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
IJMMS
2007
166views more  IJMMS 2007»
14 years 11 months ago
Visualization of large networks with min-cut plots, A-plots and R-MAT
What does a ‘normal’ computer (or social) network look like? How can we spot ‘abnormal’ sub-networks in the Internet, or web graph? The answer to such questions is vital f...
Deepayan Chakrabarti, Christos Faloutsos, Yiping Z...
ASSETS
2006
ACM
15 years 5 months ago
A Cisco education tool accessible to the vision impaired
This paper describes iNetSim, a universally accessible network simulator, created to allow vision-impaired and sighted users to complete Cisco Certified Network Associate level tw...
J. Hope, Brian R. von Konsky, I. Murray, L. C. Che...
NIPS
2004
15 years 1 months ago
Modeling Conversational Dynamics as a Mixed-Memory Markov Process
In this work, we quantitatively investigate the ways in which a given person influences the joint turn-taking behavior in a conversation. After collecting an auditory database of ...
Tanzeem Choudhury, Sumit Basu
OZCHI
2006
ACM
15 years 5 months ago
A wearable folding display for self-expression
This paper proposes the design rationale of a wearable display that is able to convey the behavioral typology of its wearers by merging insights from wearable computing, aesthetic...
Andrew Vande Moere, Monika Hoinkis
PDC
2006
ACM
15 years 5 months ago
Oppositional and activist new media: remediation, reconfiguration, participation
Over the last decade, the major firms and cultural institutions that have dominated media and information industries in the U.S. and globally have been challenged by people adopti...
Leah A. Lievrouw