Sciweavers

2421 search results - page 164 / 485
» Message from the Co-Chairs
Sort
View
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 3 months ago
The Impact of Social Types within Information Communities: Findings from Technical Newsgroups
We explored whether Fisher and Durrance’s [11] framework of information communities applies to online technical newsgroups and the impact of particular social types on informati...
Tammara Combs Turner, Karen E. Fisher
FOCS
2007
IEEE
14 years 3 months ago
Lower Bounds on Signatures From Symmetric Primitives
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most 2(1+o(1))q , where q is the total number of oracle queries a...
Boaz Barak, Mohammad Mahmoody-Ghidary
ICPP
2007
IEEE
14 years 3 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
AUIC
2003
IEEE
14 years 2 months ago
Get a Way Back: Evaluating Retrieval from History Lists
Many user interfaces include history lists that help users retrieve temporally ordered information such as previously visited web pages, email messages, and recently used files. ...
Michael Jasonsmith, Andy Cockburn
CAEPIA
2003
Springer
14 years 2 months ago
Clustering Main Concepts from e-Mails
E–mail is one of the most common ways to communicate, assuming, in some cases, up to 75% of a company’s communication, in which every employee spends about 90 minutes a day in ...
Jesús S. Aguilar-Ruiz, Domingo S. Rodr&iacu...