Sciweavers

2817 search results - page 536 / 564
» A Framework for the Management of Information Security
Sort
View
WICOMM
2008
122views more  WICOMM 2008»
13 years 9 months ago
Energy and connectivity performance of routing groups in multi-radio multi-hop networks
This paper explores the logical device aggregation of terminals in future generation networks, where the availability of several different radio access techniques is integrated by...
Michele Rossi, Leonardo Badia, Paolo Giacon, Miche...
UIST
2010
ACM
13 years 7 months ago
TwinSpace: an infrastructure for cross-reality team spaces
We introduce TwinSpace, a flexible software infrastructure for combining interactive workspaces and collaborative virtual worlds. Its design is grounded in the need to support dee...
Derek F. Reilly, Hafez Rouzati, Andy Wu, Jee Yeon ...
CSCW
2011
ACM
13 years 4 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill
NAR
2010
107views more  NAR 2010»
13 years 4 months ago
FlyTF: improved annotation and enhanced functionality of the Drosophila transcription factor database
FlyTF (http://www.flytf.org) is a database of computationally predicted and/or experimentally verified site-specific transcription factors (TFs) in the fruit fly Drosophila melano...
Ulrike Pfreundt, Daniel P. James, Susan Tweedie, D...
SIGMOD
2012
ACM
240views Database» more  SIGMOD 2012»
12 years 1 days ago
Finding related tables
We consider the problem of finding related tables in a large corpus of heterogenous tables. Detecting related tables provides users a powerful tool for enhancing their tables wit...
Anish Das Sarma, Lujun Fang, Nitin Gupta 0003, Alo...