Sciweavers

5272 search results - page 996 / 1055
» Design of Social Agents
Sort
View
PETRA
2009
ACM
14 years 3 months ago
Carbon nanotube coated high-throughput neurointerfaces in assistive environments
Loosing motor activity due to impaired or damaged nerves or muscles affects millions of people world-wide. The resulting lack of mobility and/or impaired communication bears enorm...
Mario I. Romero-Ortega, Ali Raza Butt, Samir M. Iq...
SIGCOMM
2009
ACM
14 years 3 months ago
CrossTalk: scalably interconnecting instant messaging networks
We consider the problem of interconnecting a simple type of social network: Instant Messaging services. Today, users are members of various IM communities such as AOL, Yahoo, and ...
Marti A. Motoyama, George Varghese
WIKIS
2009
ACM
14 years 3 months ago
Herding the cats: the influence of groups in coordinating peer production
Peer production systems rely on users to self-select appropriate tasks and “scratch their personal itch”. However, many such systems require significant maintenance work, whic...
Aniket Kittur, Bryan A. Pendleton, Robert E. Kraut
AFRICACRYPT
2010
Springer
14 years 3 months ago
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communica...
Michel Abdalla, Céline Chevalier, Mark Manu...
ACSAC
2008
IEEE
14 years 3 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...