Sciweavers

815 search results - page 132 / 163
» Social network analysis and interactive device design analys...
Sort
View
CHIMIT
2007
ACM
13 years 11 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
SNPD
2008
13 years 9 months ago
The Implementation and Execution Framework of a Role Model Based Language, EpsilonJ
In the social reality, objects communicate with each other by means of assuming roles to establish collaboration, and then can adaptively change their roles to obtain other intera...
Supasit Monpratarnchai, Tamai Tetsuo
TELSYS
2010
122views more  TELSYS 2010»
13 years 6 months ago
Transmission scheduling for multi-homed transport protocols with network failure tolerance
In heterogeneous network environments, the network connections of a multi-homed device may have significant bandwidth differential. For a multihomed transmission protocol designed ...
Yuansong Qiao, Enda Fallon, John Murphy, Liam Murp...
PERCOM
2007
ACM
14 years 7 months ago
Practical Exploitation of the Energy-Latency Tradeoff for Sensor Network Broadcast
As devices become more reliant on battery power, it is essential to design energy efficient protocols. While there is a vast amount of research into power save protocols for unicas...
Matthew J. Miller, Indranil Gupta
MM
2006
ACM
115views Multimedia» more  MM 2006»
14 years 1 months ago
Human-centered computing: a multimedia perspective
Human-Centered Computing (HCC) is a set of methodologies that apply to any field that uses computers, in any form, in applications in which humans directly interact with devices o...
Alejandro Jaimes, Nicu Sebe, Daniel Gatica-Perez