Sciweavers

1161 search results - page 206 / 233
» Group Message Authentication
Sort
View
ISI
2007
Springer
14 years 1 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 1 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communities...
Karine Barzilai-Nahon
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Impact of Social Types within Information Communities: Findings from Technical Newsgroups
We explored whether Fisher and Durrance’s [11] framework of information communities applies to online technical newsgroups and the impact of particular social types on informati...
Tammara Combs Turner, Karen E. Fisher
SRDS
2006
IEEE
14 years 1 months ago
Topology Sensitive Replica Selection
As the disks typically found in personal computers grow larger, protecting data by replicating it on a collection of “peer” systems rather than on dedicated high performance s...
Dmitry Brodsky, Michael J. Feeley, Norman C. Hutch...
PEWASUN
2006
ACM
14 years 1 months ago
Context-aware multicast routing scheme for disruption tolerant networks
: Disruption Tolerant Networks (DTNs) are emerging solutions to networks that experience frequent network partitions and large end-to-end delays. Several schemes have been proposed...
Peng Yang, Mooi Choo Chuah