Sciweavers

211 search results - page 13 / 43
» Secrecy and Group Creation
Sort
View
GROUP
2009
ACM
14 years 3 months ago
All My People Right Here, Right Now: management of group co-presence on a social networking site
A mundane but theoretically interesting and practically relevant situation presents itself on social networking sites: the co-presence of multiple groups important to an individua...
Airi Lampinen, Sakari Tamminen, Antti Oulasvirta
EL
2011
86views more  EL 2011»
12 years 8 months ago
The use of metadata and preservation methods for continuous access to digital data
Data loss prevention starts with the creation of a digital object. However, methods to minimize the loss of digital data are often ignored, the use of metadata structures embedded...
Ria Groenewald, Amelia Breytenbach
CHI
2010
ACM
14 years 1 months ago
The NICE discussion room: integrating paper and digital media to support co-located group meetings
Current technological solutions that enable content creation and sharing during group discussion meetings are often cumbersome to use, and are commonly abandoned for traditional p...
Michael Haller, Jakob Leitner, Thomas Seifried, Ja...
BMCBI
2006
112views more  BMCBI 2006»
13 years 8 months ago
A phylogenomic gene cluster resource: the Phylogenetically Inferred Groups (PhIGs) database
Background: We present here the PhIGs database, a phylogenomic resource for sequenced genomes. Although many methods exist for clustering gene families, very few attempt to create...
Paramvir S. Dehal, Jeffrey L. Boore
JNW
2008
97views more  JNW 2008»
13 years 8 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews