Sciweavers

3092 search results - page 22 / 619
» Where are you pointing
Sort
View
ASUNAM
2009
IEEE
14 years 2 months ago
Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation
The increased online presence of jihadists has raised the possibility of individuals being radicalised via the Internet. To date, the study of violent radicalisation has focused o...
Adam Bermingham, Maura Conway, Lisa McInerney, Nei...
EJIS
2006
105views more  EJIS 2006»
13 years 7 months ago
Activity-based design
In many types of activities, communicative and material activities are so intertwined that the one cannot be understood without taking the other into account. This is true of mari...
Peter Bøgh Andersen
JOT
2007
99views more  JOT 2007»
13 years 7 months ago
On the Footprints of Join Points: The Blueprint Approach
nt selection mechanism at a high-level of abstraction to decouple aspects from the application code. To this regard, we adopt a high-level pattern-based join point model, where joi...
Walter Cazzola, Sonia Pini
CCCG
2007
13 years 9 months ago
On the Number of Empty Pseudo-Triangles in Point Sets
We analyze the minimum and maximum number of empty pseudo-triangles defined by any planar point set. We consider the cases where the three convex vertices are fixed and where th...
Marc J. van Kreveld, Bettina Speckmann
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 1 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen