Sciweavers

2421 search results - page 51 / 485
» Message from the Editor-in-Chief
Sort
View
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
13 years 11 months ago
Temporal Patterns in Student-Advisor Instant Messaging Exchanges: Individual Variation and Accommodation
This study analyzed rhythm and timing in 18 instant messenger (IM) conversations between one advisor and four graduate students (4 dyads), hypothesizing that individuals would sho...
Amaury de Siqueira, Susan C. Herring
ICWSM
2010
13 years 9 months ago
Conversational Shadows: Describing Live Media Events Using Short Messages
Microblogging concurrently with live media events is becoming commonplace. The resulting comment stream represents a parallel, social conversational reflection on the event. Altho...
David A. Shamma, Lyndon Kennedy, Elizabeth F. Chur...
IWC
2010
86views more  IWC 2010»
13 years 6 months ago
Enhancing privacy management support in instant messaging
Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. Inadequate support for...
Sameer Patil, Alfred Kobsa
ICPP
2009
IEEE
13 years 5 months ago
Cache-Efficient, Intranode, Large-Message MPI Communication with MPICH2-Nemesis
The emergence of multicore processors raises the need to efficiently transfer large amounts of data between local processes. MPICH2 is a highly portable MPI implementation whose l...
Darius Buntinas, Brice Goglin, David Goodell, Guil...