Sciweavers

1534 search results - page 213 / 307
» networks 2011
Sort
View
MP
2011
14 years 1 months ago
Implicit solution function of P0 and Z matrix linear complementarity constraints
Abstract. Using the least element solution of the P0 and Z matrix linear complementarity problem (LCP), we define an implicit solution function for linear complementarity constrai...
Xiaojun Chen, Shuhuang Xiang
CHI
2011
ACM
14 years 2 months ago
Identifying social capital in the facebook interface
A number of studies have identified a robust relationship between the use of social network sites, particularly Facebook, and positive outcomes such as social capital. Social netw...
Christian Yoder, Fred Stutzman
INFOCOM
2011
IEEE
14 years 2 months ago
Sensor localization with deterministic accuracy guarantee
—Localizability of network or node is an important subproblem in sensor localization. While rigidity theory plays an important role in identifying several localizability conditio...
Ryo Sugihara, Rajesh K. Gupta
CODASPY
2011
14 years 2 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
HICSS
2011
IEEE
168views Biometrics» more  HICSS 2011»
14 years 2 months ago
WordBridge: Using Composite Tag Clouds in Node-Link Diagrams for Visualizing Content and Relations in Text Corpora
We introduce WordBridge, a novel graph-based visualization technique for showing relationships between entities in text corpora. The technique is a node-link visualization where b...
KyungTae Kim, Sungahn Ko, Niklas Elmqvist, David S...