Sciweavers

471 search results - page 36 / 95
» Social applications: exploring a more secure framework
Sort
View
ICMI
2010
Springer
172views Biometrics» more  ICMI 2010»
13 years 5 months ago
Modelling and analyzing multimodal dyadic interactions using social networks
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...
Sergio Escalera, Petia Radeva, Jordi Vitrià...
SACMAT
2009
ACM
14 years 13 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
WWW
2011
ACM
13 years 2 months ago
Mark my words!: linguistic style accommodation in social media
The psycholinguistic theory of communication accommodation accounts for the general observation that participants in conversations tend to converge to one another’s communicativ...
Cristian Danescu-Niculescu-Mizil, Michael Gamon, S...
ISPASS
2005
IEEE
14 years 1 months ago
Analysis of Network Processing Workloads
Abstract— Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality inside the network. Mode...
Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf
POPL
2004
ACM
14 years 8 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette