Sciweavers

4612 search results - page 136 / 923
» More Communications
Sort
View
ETRICS
2006
15 years 8 months ago
Revocable Anonymity
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this...
Stefan Köpsell, Rolf Wendolsky, Hannes Federr...
CSCW
2012
ACM
14 years 3 days ago
Of joy and gender: emotional expression in online social networks
In this study, we analyzed the language use on Twitter personal exchanges as well as properties of the users’ networks, to study the influence of gender composition on expressio...
Funda Kivran-Swaine, Samuel Brody, Nicholas Diakop...
INFOCOM
2009
IEEE
15 years 11 months ago
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol
—In this paper, we propose the Staggered TDMA Underwater MAC Protocol (STUMP), a scheduled, collision free TDMA-based MAC protocol that leverages node position diversity and the ...
Kurtis B. Kredo II, Petar Djukic, Prasant Mohapatr...
ICC
2009
IEEE
15 years 11 months ago
A New Efficient Mechanism for Establishing IP Connectivity between Ambient Networks
—The changes in the communication paradigm envisioned for future networks, with peer-to-peer/symmetric attachments gaining momentum and two IP (Internet Protocol) versions coexis...
Rui Campos, Manuel Ricardo
GLOBECOM
2007
IEEE
15 years 10 months ago
A Hash Function Scheme for Key Management in UMTS MBMS
—3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service ...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin