Sciweavers

122 search results - page 9 / 25
» Responsibility for believing
Sort
View
WWW
2009
ACM
14 years 10 months ago
Behavioral profiles for advanced email features
We examine the behavioral patterns of email usage in a large-scale enterprise over a three-month period. In particular, we focus on two main questions: (Q1) what do replies depend...
Thomas Karagiannis, Milan Vojnovic
MUE
2007
IEEE
97views Multimedia» more  MUE 2007»
14 years 4 months ago
NTS6: IPv6 based Network Topology Service System of CERNET2
In this paper, we propose NTS6, an IPv6 based Network Topology Service system, which provides a Query and Response Service of Network Topology Information between any pair of host...
Lin Cong, Bo Yang, Yang Chen, Guohan Lu, Beixing D...
ISI
2005
Springer
14 years 3 months ago
Information Supply Chain: A Unified Framework for Information-Sharing
To balance demand and supply of information, we propose a framework called “information supply chain” (ISC). This framework is based on supply chain management (SCM), which has...
Shuang Sun, John Yen
OZCHI
2005
ACM
14 years 3 months ago
Making sense of student use of nonverbal cues for intelligent tutoring systems
Many software systems would significantly improve performance if they could interpret the nonverbal cues in their user’s interactions as humans normally do. Currently, Intellige...
Farhad Dadgostar, Hokyoung Ryu, Abdolhossein Sarra...
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 9 months ago
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy si...
Tianjie Cao, Xianping Mao