Sciweavers

980 search results - page 27 / 196
» Analyzing Flickr groups
Sort
View
ATC
2007
Springer
14 years 4 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
MICCAI
2008
Springer
14 years 11 months ago
Group Statistics of DTI Fiber Bundles Using Spatial Functions of Tensor Measures
We present a framework for hypothesis testing of differences between groups of DTI fiber tracts. An anatomical, tract-oriented coordinate system provides a basis for estimating the...
Casey Goodlett, P. Thomas Fletcher, John H. Gilm...
ER
1998
Springer
130views Database» more  ER 1998»
14 years 2 months ago
Group Activity Database for Groupware Evolution
This paper proposes a new type of database for collaborative work. Known types of databases for collaborative work are databases of shared data and those of process data. A new typ...
Hiroyuki Tarumi, Tetsuya Matsuyama, Yahiko Kambaya...
WCRE
2007
IEEE
14 years 4 months ago
A Study of Consistent and Inconsistent Changes to Code Clones
Code Cloning is regarded as a threat to software maintenance, because it is generally assumed that a change to a code clone usually has to be applied to the other clones of the cl...
Jens Krinke
WSC
2007
14 years 10 days ago
Upgraded cellular automata based group-work interaction simulation
The simulation of group-work interaction is significant for Chinese enterprise organizational management. As a result, a cellular-automata based simulation model is put forward. T...
Dong Shengping, Hu Bin