Sciweavers

7395 search results - page 62 / 1479
» Social Modeling and i*
Sort
View
APN
2006
Springer
15 years 3 months ago
Can I Execute My Scenario in Your Net? VipTool Tells You!
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, given...
Robin Bergenthum, Jörg Desel, Gabriel Juh&aac...
TWC
2008
147views more  TWC 2008»
14 years 11 months ago
On antijamming in general CDMA systems-part I: multiuser capacity analysis
Abstract--The capacity of a general multiuser CDMA jamming channel is analyzed when the receiver has or lacks jammer state information. Analyses are carried out for noncooperative ...
Reza Nikjah, Norman C. Beaulieu
TIT
2010
150views Education» more  TIT 2010»
14 years 6 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
CHI
2009
ACM
16 years 14 days ago
Exploring the cognitive consequences of social search
To what extent can social interactions augment people's natural search experiences? What factors influence the decision to turn to a friend for help? Our paper presents the p...
Brynn M. Evans, Sanjay Kairam, Peter Pirolli
IJFIPM
2008
156views more  IJFIPM 2008»
14 years 12 months ago
Dynamic intimate contact social networks and epidemic interventions
Abstract: Sexually transmitted diseases and infections are, by definition, transferred among intimate social settings. Although the circumstances under which these social settings ...
Courtney Corley, Armin R. Mikler, Diane J. Cook, K...