Sciweavers

58 search results - page 9 / 12
» Tracking Hidden Groups Using Communications
Sort
View
WOWMOM
2000
ACM
96views Multimedia» more  WOWMOM 2000»
13 years 12 months ago
An integrated mobility and traffic model for resource allocation in wireless networks
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark
CHI
2007
ACM
14 years 8 months ago
Modeling the impact of shared visual information on collaborative reference
A number of recent studies have demonstrated that groups benefit considerably from access to shared visual information. This is due, in part, to the communicative efficiencies pro...
Darren Gergle, Carolyn Penstein Rosé, Rober...
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
CSCW
2004
ACM
14 years 1 months ago
Controlling interruptions: awareness displays and social motivation for coordination
Spontaneous communication is common in the workplace but can be disruptive. Such communication usually benefits the initiator more than the target of an interruption. Previous res...
Laura A. Dabbish, Robert E. Kraut
RSCTC
1998
Springer
175views Fuzzy Logic» more  RSCTC 1998»
13 years 12 months ago
Business Process Understanding: Mining Many Datasets
Abstract. Institutional databases can be instrumental in understanding a business process, but additional data may broaden the empirical perspective on the investigated process. We...
Jan M. Zytkow, Arun P. Sanjeev