Sciweavers

104 search results - page 14 / 21
» Who killed the directed model
Sort
View
JCS
2007
84views more  JCS 2007»
13 years 6 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu
ICDE
2011
IEEE
245views Database» more  ICDE 2011»
12 years 10 months ago
Discovering popular routes from trajectories
—The booming industry of location-based services has accumulated a huge collection of users’ location trajectories of driving, cycling, hiking, etc. In this work, we investigat...
Zaiben Chen, Heng Tao Shen, Xiaofang Zhou
SIGUCCS
1999
ACM
13 years 11 months ago
Bridging Worlds: The IT Support Professional as Interpreter Between Cultures
One result of the action of Moore’s Law, the doubling of IT (Information Technology) power every 18 months, is a widening gap in the understanding of this technology between tho...
Don Rea
ICRA
2005
IEEE
138views Robotics» more  ICRA 2005»
14 years 9 days ago
The Role of Motion Information in Learning Human-Robot Joint Attention
— To realize natural human-robot interactions and investigate the developmental mechanism of human communication, an effective approach is to construct models by which a robot im...
Yukie Nagai
CIKM
2010
Springer
13 years 5 months ago
Predicting product adoption in large-scale social networks
Online social networks offer opportunities to analyze user behavior and social connectivity and leverage resulting insights for effective online advertising. We study the adopti...
Rushi Bhatt, Vineet Chaoji, Rajesh Parekh