Sciweavers

8243 search results - page 146 / 1649
» Can We Manage Trust
Sort
View
IVA
2009
Springer
14 years 2 months ago
Turn Management or Impression Management?
We look at how some basic choices in the management of turns influence the impression that people get from an agent. We look at scales concerning personality, emotion and interper...
Mark ter Maat, Dirk Heylen
NOMS
1998
IEEE
154views Communications» more  NOMS 1998»
14 years 2 months ago
A framework for end-to-end proactive network management
Current advances in networking, computing, software and web technologies have led to an explosive growth in the development of networked applications. Management of large-scale ne...
Salim Hariri, Yoonhee Kim, K. Varshney, R. Kaminsk...
RE
2007
Springer
14 years 4 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
LCN
2006
IEEE
14 years 4 months ago
Detecting Malicious Peers in Overlay Multicast Streaming
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may ...
Samarth Shetty, Patricio Galdames, Wallapak Tavana...
SCN
2008
Springer
166views Communications» more  SCN 2008»
13 years 10 months ago
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
Abstract-- Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applicat...
Pandurang Kamat, Arati Baliga, Wade Trappe