CS Communication

Results: 1405



#Item
301

Effects of Mass Media and Opinion Exchange on Extremist Group Formation Steven Butler1 and Joanna J. Bryson1 Department of Computer Science, University of Bath, BA2 7AY. UK Abstract. Contemporary communication technolog

Add to Reading List

Source URL: www.cs.bath.ac.uk

Language: English - Date: 2008-07-28 05:27:13
    302

    Broadly Improving User Classification via Communication-Based Name and Location Clustering on Twitter Shane Bergsma, Mark Dredze, Benjamin Van Durme, Theresa Wilson, David Yarowsky Department of Computer Science and Huma

    Add to Reading List

    Source URL: www.cs.jhu.edu

    Language: English - Date: 2013-10-24 11:26:02
      303Multiplication / Matrix theory / Numerical linear algebra / Matrix multiplication algorithm / Analysis of algorithms / Computational complexity theory / Matrix multiplication / Matrix / Parallel computing / Multiplication algorithm / Algorithm / Time complexity

      Communication Optimal Parallel Multiplication of Sparse Random Matrices∗ Grey Ballard Aydın Buluç

      Add to Reading List

      Source URL: gauss.cs.ucsb.edu

      Language: English - Date: 2013-05-20 18:41:58
      304

      Zero-Communication Seed Establishment for Anti-Jamming Techniques Kim Pecina Esfandiar Mohammadi

      Add to Reading List

      Source URL: sps.cs.uni-saarland.de

      Language: English - Date: 2014-02-07 05:11:07
        305Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network

        On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2006-10-10 13:39:42
        306

        AnoA: A Framework For Analyzing Anonymous Communication Protocols Unified Definitions and Analyses of Anonymity Properties Michael Backes1,2 Aniket Kate3

        Add to Reading List

        Source URL: www.infsec.cs.uni-saarland.de

        Language: English - Date: 2014-07-15 05:29:13
          307Internet protocols / Secure communication / Internet Standards / Transmission Control Protocol / Relay / Tor / Transport layer / Internet Relay Chat flood / HTTPS / Denial-of-service attack / Quality of service / Internet Relay Chat

          IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2014-09-10 17:17:22
          308

          Power-Aware Rateless Codes in Mobile Wireless Communication Calum Harrison University College London

          Add to Reading List

          Source URL: www0.cs.ucl.ac.uk

          Language: English
            309Oral communication / Human communication / Jargon / Social Visualization / Electrical engineering / Academia / Feedback / Turn-taking / Conversation / Visualization / Distortion

            Distorting Social Feedback in Visualizations of Conversation Tony Bergstrom and Karrie Karahalios University of Illinois {abergst2, kkarahal}@cs.uiuc.edu Abstract

            Add to Reading List

            Source URL: social.cs.uiuc.edu

            Language: English - Date: 2011-10-11 06:43:47
            310

            Optimizing Communication and Capacity in a 3D Stacked Reconfigurable Cache Hierarchy ∗ Niti Madan† , Li Zhao‡ , Naveen Muralimanohar† , Aniruddha Udipi† , Rajeev Balasubramonian† , Ravishankar Iyer‡ , Sriha

            Add to Reading List

            Source URL: www.cs.utah.edu

            Language: English - Date: 2008-12-15 15:02:49
              UPDATE