Sciweavers

2347 search results - page 458 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
GROUP
2009
ACM
14 years 2 months ago
WaterCooler: exploring an organization through enterprise social media
As organizations scale up, their collective knowledge increases, and the potential for serendipitous collaboration between members grows dramatically. However, finding people wit...
Michael J. Brzozowski
SOUPS
2009
ACM
14 years 2 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
BIBM
2008
IEEE
212views Bioinformatics» more  BIBM 2008»
14 years 2 months ago
Analysis of Multiplex Gene Expression Maps Obtained by Voxelation
Background: Gene expression signatures in the mammalian brain hold the key to understanding neural development and neurological disease. Researchers have previously used voxelatio...
Li An, Hongbo Xie, Mark H. Chin, Zoran Obradovic, ...
CDC
2008
IEEE
134views Control Systems» more  CDC 2008»
14 years 2 months ago
Networked control systems with packet delays and losses
— We investigate the effect of packet delays and packet drops on networked control systems. First we consider the problem of where to locate a controller or state estimator in a...
Craig L. Robinson, P. R. Kumar
ICCCN
2008
IEEE
14 years 2 months ago
Localized Bridging Centrality for Distributed Network Analysis
— Centrality is a concept often used in social network analysis to study different properties of networks that are modeled as graphs. We present a new centrality metric called Lo...
Soumendra Nanda, David Kotz