Sciweavers

6696 search results - page 1276 / 1340
» Securing social networks
Sort
View
ICDCS
2007
IEEE
14 years 24 days ago
Understanding Instant Messaging Traffic Characteristics
Instant messaging (IM) has become increasingly popular due to its quick response time, its ease of use, and possibility of multitasking. It is estimated that there are several mil...
Zhen Xiao, Lei Guo, John M. Tracey
GD
2006
Springer
14 years 18 days ago
The Website for Graph Visualization Software References (GVSR)
Graph drawing software are now commonly used. However, the choice of a well-adapted program may be hard for an inexperienced user. This poster presents a website (http://www.polyte...
Bruno Pinaud, Pascale Kuntz, Fabien Picarougne
AISB
2008
Springer
13 years 11 months ago
Foundations of a Philosophy of Collective Intelligence
Philosophy, artificial intelligence and cognitive science have long been dominated by the presupposition that intelligence is fundamentally individual. Recent work in cognitive sci...
Harry Halpin
ATAL
2008
Springer
13 years 11 months ago
Decentralised coordination of low-power embedded devices using the max-sum algorithm
This paper considers the problem of performing decentralised coordination of low-power embedded devices (as is required within many environmental sensing and surveillance applicat...
Alessandro Farinelli, Alex Rogers, Adrian Petcu, N...
CEAS
2008
Springer
13 years 11 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
« Prev « First page 1276 / 1340 Last » Next »