Sciweavers

2478 search results - page 62 / 496
» Message from the Chair
Sort
View
CSCW
2002
ACM
15 years 3 months ago
The character, functions, and styles of instant messaging in the workplace
Current perceptions of Instant Messaging (IM) use are based primarily on self-report studies. We logged thousands of (mostly) workplace IM conversations and evaluated their conver...
Ellen Isaacs, Alan Walendowski, Steve Whittaker, D...
RIA
2008
104views more  RIA 2008»
15 years 3 months ago
Scatterbox: Context-Aware Message Management
Applications that rely on mobile devices for user interaction must be mindful of the user's limited attention, which will typically be split between several competing tasks. C...
Stephen Knox, Ross Shannon, Lorcan Coyle, Adrian K...
JMLR
2012
13 years 6 months ago
Globally Optimizing Graph Partitioning Problems Using Message Passing
Graph partitioning algorithms play a central role in data analysis and machine learning. Most useful graph partitioning criteria correspond to optimizing a ratio between the cut a...
Elad Mezuman, Yair Weiss
CCECE
2006
IEEE
15 years 10 months ago
A Formal CSP Framework for Message-Passing HPC Programming
To help programmers of high-performance computing (HPC) systems avoid communication-related errors, we employ a formal process algebra, Communicating Sequential Processes (CSP), w...
John D. Carter, William B. Gardner
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 10 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...