• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 70
Next 10 →

Teenage communication in the Instant Messaging era

by Bonka S. Boneva, Amy Quinn, Robert E. Kraut, Sara Kiesler, Irina Shklovski - In , 2006
"... In this chapter, we investigate how instant messaging (IM) satisfies two major needs for adolescents: maintaining individual friendships and belonging to peer groups. In order to better understand these processes, we compare adolescent IM communication patterns to in-person and phone communication p ..."
Abstract - Cited by 25 (0 self) - Add to MetaCart
In this chapter, we investigate how instant messaging (IM) satisfies two major needs for adolescents: maintaining individual friendships and belonging to peer groups. In order to better understand these processes, we compare adolescent IM communication patterns to in-person and phone communication

The role of friends' appearance and behavior on evaluations of individuals on Facebook: Are we known by the company we keep?.

by Joseph B Walther , Brandon Van Der Heide , Sang-Yeon Kim , David Westerman , Stephanie Tom Tong , Joseph B Walther - Human Communication Research, , 2008
"... This research explores how cues deposited by social partners onto one's online networking profile affect observers' impressions of the profile owner. An experiment tested the relationships between both (a) what one's associates say about a person on a social network site via '&a ..."
Abstract - Cited by 65 (0 self) - Add to MetaCart
' friends' attractiveness affected their own in an assimilative pattern. Favorable or unfavorable statements about the targets interacted with target gender: Negatively valenced messages about certain moral behaviors increased male profile owners' perceived physical attractiveness, although

Human Trust Establishment

by Michael Farb, Manish Burman, Gurtej Singh Ch, Jon Mccune, Adrian Perrig, Michael Farb, Manish Burman, Gurtej Singh, Chandok Jon, Mccune Adrian Perrig , 2011
"... Users regularly experience a crisis of confidence on the Internet. Is that email truly originating from the claimed individual? Is that Facebook invitation indeed from that person or is it a fake page set up by an impersonator? These doubts are usually resolved through a leap of faith, expressing th ..."
Abstract - Add to MetaCart
the desperation of users. To establish a secure basis for Internet communication, we propose SafeSlinger, a system leveraging the proliferation of smartphones to enable people to securely and privately exchange their public keys. Through the exchanged authentic public key, SafeSlinger establishes a secure channel

Review on Text Mining Algorithms

by Shivani Sharma, M. Tech (cse Scholar, Saurabh Kr. Srivastava
"... Nowadays twitter microblog has become very popular in the conversation practice and in spreading awareness about various issues among the people. People share their short messages / tweets among their private / public social network. These messages are valuable for the number of tasks to identify hi ..."
Abstract - Add to MetaCart
hidden knowledge patterns from the discussions. Many research have been conducted on text classification. Text classification uses terms as features which can be grouped to vote for belongingness of a class. Text classification can be carried on twitter data and various machine learning algorithms can

©2005 Raj JainSecurity Solutions

by Raj Jain, Mac Address Filtering
"... � Access Point contains MAC addresses of NICs ..."
Abstract - Add to MetaCart
� Access Point contains MAC addresses of NICs

05 SIMULTANEOUS CLASSICAL-QUANTUM CAPACITIES OF QUANTUM MULTIPLE ACCESS CHANNELS

by Abbas El Gamal, Carl A. Yard , 2005
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

LumiNet An Organic Interactive Illumination Network Diploma Thesis at the Media Computing Group

by Prof Dr, Jan Borchers, René Bohne, René Bohne V
"... I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig verfasst und keine anderen als die angegebenen Quellen un ..."
Abstract - Add to MetaCart
I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel benutzt sowie Zitate kenntlich gemacht habe.

c Copyright by

by Paul Sivilotti, Dong Xuan, Xiaodong Zhang, Hongwei Zhang
"... Messaging is a basic service in sensornets. Yet the unique system and application prop-erties of sensornets pose substantial challenges for the messaging design: Firstly, dynamic wireless links, constrained resources, and application diversity challenge the architecture and protocol design of sensor ..."
Abstract - Add to MetaCart
Messaging is a basic service in sensornets. Yet the unique system and application prop-erties of sensornets pose substantial challenges for the messaging design: Firstly, dynamic wireless links, constrained resources, and application diversity challenge the architecture and protocol design

Taipei TW

by Chia-hsin Owen Chen, Chung-wei Chen, Cynthia Kuo, Yan-hao Lai, Jonathan M. Mccune, National Tsing Hua, Taichung Tw
"... Establishing secure communication among a group of physically collocated people is a challenge. This problem can be reduced to establishing authentic public keys among all the participants – these public keys then serve to establish a shared secret symmetric key for encryption and authentication of ..."
Abstract - Add to MetaCart
Establishing secure communication among a group of physically collocated people is a challenge. This problem can be reduced to establishing authentic public keys among all the participants – these public keys then serve to establish a shared secret symmetric key for encryption and authentication

Cryptographic Voting Protocols A Prototype Design and Implementation for University Elections at TU Darmstadt

by Alexander Klink, Betreut Von Evangelos Karatsiolis, Technische Universität Darmstadt, Fachbereich Informatik, Fachgebiet Theoretische Informatik
"... I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant m ..."
Abstract - Add to MetaCart
I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant motivation. • Roberto Samarone Araujo for hours of discussing various protocols with Evengelos and me. • Warren D. Smith for providing with a preliminary version of his upcoming book »How Mathematics can Improve Democracy«. • Ute Günther and Christian Burgmann for their proof-reading. Nonetheless, any remaing errors shall be blamed on me. • Andrea Peter for her love and for cheering me up when I was down. • Last but not least my parents, Jacqueline Herrnkind and Hans Peter Klink – without their love and continuous support, this thesis would never have been written.
Next 10 →
Results 1 - 10 of 70
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University