Sciweavers

1172 search results - page 171 / 235
» Who killed design
Sort
View
IJMMS
2008
131views more  IJMMS 2008»
13 years 10 months ago
Avatars in social media: Balancing accuracy, playfulness and embodied messages
This paper examines how users negotiate their self-presentation via an avatar used in social media. Twenty participants customised an avatar while thinking aloud. An analysis of t...
Asimina Vasalou, Adam N. Joinson, Tanja Bänzi...
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 10 months ago
Improved Security Mechanism for Mobile IPv6
Security is a critical design issue in Mobile IPv6 since adversaries can take advantage of its routing process and arbitrarily channelize the traffic to different destinations. Th...
Jing Li, Po Zhang, Srinivas Sampalli
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 10 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
COMSIS
2007
80views more  COMSIS 2007»
13 years 10 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
IJKL
2006
94views more  IJKL 2006»
13 years 10 months ago
Supporting teachers as content authors in intelligent educational systems
: Intelligent Educational Systems (IESs) need large amounts of educational content that is typically not provided by the creators of these systems. In this paper we discuss a new a...
Peter Brusilovsky, Judith Knapp, Johann Gamper