In this study, we analyzed the language use on Twitter personal exchanges as well as properties of the users’ networks, to study the influence of gender composition on expressio...
Funda Kivran-Swaine, Samuel Brody, Nicholas Diakop...
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
This paper proposes a design for the optimized dynamic (re)composition of services that supports various user requests and accounts for changes in user`s context. The composition ...
An active research area in telecommunications concerns how to specify and control the addition of new services, such as call waiting or instant messaging, into existing software. ...
Emden R. Gansner, John M. Mocenigo, Stephen C. Nor...
— The development of a software product in an organization involves various groups of stakeholders who may prioritize the qualities of the product differently. This paper present...