Sciweavers

2846 search results - page 472 / 570
» Real World Teleconferencing
Sort
View
ICICS
2010
Springer
15 years 1 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
ICWSM
2010
15 years 1 months ago
Predicting Elections with Twitter: What 140 Characters Reveal about Political Sentiment
Twitter is a microblogging website where users read and write millions of short messages on a variety of topics every day. This study uses the context of the German federal electi...
Andranik Tumasjan, Timm O. Sprenger, Philipp G. Sa...
INFOCOM
2010
IEEE
15 years 1 months ago
Routing in Socially Selfish Delay Tolerant Networks
Abstract--Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are so...
Qinghua Li, Sencun Zhu, Guohong Cao
CORR
2011
Springer
181views Education» more  CORR 2011»
14 years 11 months ago
Lightweight Service Oriented Architecture for Pervasive Computing
Pervasive computing appears like a new computing era based on networks of objects and devices evolving in a real world, radically different from distributed computing, based on ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
CORR
2011
Springer
184views Education» more  CORR 2011»
14 years 11 months ago
Finding Shortest Path for Developed Cognitive Map Using Medial Axis
— this paper presents an enhancement of the medial axis algorithm to be used for finding the optimal shortest path for developed cognitive map. The cognitive map has been develop...
Hazim A. Farhan, Hussein H. Owaied, Suhaib I. Al-G...