Sciweavers

478 search results - page 60 / 96
» coordination 2009
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 2 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 2 months ago
Multiple Social Networks Analysis of FLOSS Projects using Sargas
Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, ...
Samuel Felix de Sousa Jr., Marco Antonio Balieiro,...
PERCOM
2009
ACM
14 years 2 months ago
Concurrent Event Detection for Asynchronous Consistency Checking of Pervasive Context
—Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environme...
Yu Huang 0002, Xiaoxing Ma, Jiannong Cao, XianPing...
IDTRUST
2009
ACM
14 years 2 months ago
Palantir: a framework for collaborative incident response and investigation
Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we ar...
Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Mic...
MSWIM
2009
ACM
14 years 2 months ago
Socially conscious channel selection in 802.11 WLANs for coexistence in a non-cooperative environment
The increasing number of independent IEEE 802.11 WLANs owned and managed by autonomous users has led to increased interference, resulting in performance degradation and unfairness...
Joo Ghee Lim, Chun Tung Chou, Sanjay Jha