We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 672 results
  1. Eye to Eye: Gaze Patterns Predict Remote Collaborative Problem Solving Behaviors in Triads

    We investigated the feasibility of using eye gaze to model collaborative problem solving (CPS) behaviors in 96 triads (N = 288) who used...
    Angelina Abitino, Samuel L. Pugh, ... Sidney K. D’Mello in Artificial Intelligence in Education
    Conference paper 2022
  2. Quantifying polarization in online political discourse

    In an era of increasing political polarization, its analysis becomes crucial for the understanding of democratic dynamics. This paper presents a...

    Pau Muñoz, Alejandro Bellogín, ... Fernando Díez in EPJ Data Science
    Article Open access 05 June 2024
  3. Edgelet computing: enabling privacy-preserving decentralized data processing at the network edge

    The convergence of opportunistic networks and trusted execution environments at the network edge presents a compelling opportunity for fully...

    Ludovic Javet, Nicolas Anciaux, ... Philippe Pucheral in Personal and Ubiquitous Computing
    Article 14 June 2024
  4. Secure Multiparty Computation Methods

    Murat Kantarcolu, Jaideep Vaidya in Encyclopedia of Database Systems
    Reference work entry 2018
  5. Abuse-freeness in contract signing: a blockchain-based proposal

    Electronic contract signing requires the design of protocols that guarantee that the exchange is fair. In the past 5 years, we have observed that...

    Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos in International Journal of Information Security
    Article Open access 10 March 2024
  6. Multiparty Federation

    Federated identity protocols like SAML and OpenID Connect enable us to authenticate people in other domains, but trust issues quickly surface. For...
    Michael Schwartz, Maciej Machulak in Securing the Perimeter
    Chapter 2018
  7. Microsoft Teams Troubleshooting Approaches

    Balu N Ilaga* Vijay Ireddy
    Balu N Ilag, Durgesh Tripathy, Vijay Ireddy in Understanding Microsoft Teams Administration
    Chapter 2024
  8. Data Democratization, Governance, and Security

    Modern data democratization, governance, and security in the modern data warehouse environment is not conceptual anymore—it is essential. Data needs...
    Anjani Kumar, Abhishek Mishra, Sanjeev Kumar in Architecting a Modern Data Warehouse for Large Enterprises
    Chapter 2024
  9. Case Study of Commercial Systems

    In this chapter, we review a variety of commercial systems for CIR and related tasks. Due to the proprietary nature of many of these systems, we...
    Jianfeng Gao, Chenyan **ong, ... Nick Craswell in Neural Approaches to Conversational Information Retrieval
    Chapter 2023
  10. The Threat of Surveillance and the Need for Privacy Protections

    In recent years, and since the introduction of the General Data Protection Regulation (GDPR) in particular, we have seen an increased interest (and...
    Martina Lindorfer in Introduction to Digital Humanism
    Chapter Open access 2024
  11. Joint Video Transcoding and Representation Selection for Edge-Assisted Multi-party Video Conferencing

    Current cloud-based multi-party video conferencing suffers from heavy workloads on media servers caused by video transcoding. Emerging edge computing...
    Fanhao Kong, Tuo Cao, ... Zhenjie Lin in Algorithms and Architectures for Parallel Processing
    Conference paper 2024
  12. The Social Responsibilities of Scientists and Technologists in the Digital Age

    What responsibilities do digital scientists and professionals have in serving society and the public, beyond doing “purely” “fundamental” scientific,...
    Chapter Open access 2024
  13. Challenges and Opportunities of Computational Social Science for Official Statistics

    The vast amount of data produced everyday (so-called digital traces) and available nowadays represent a gold mine for the social sciences, especially...
    Serena Signorelli, Matteo Fontana, ... Michele Vespe in Handbook of Computational Social Science for Policy
    Chapter Open access 2023
  14. Vulnerability management as compliance requirement in product security regulation—a game changer for producers’ liability and consequential improvement of the level of security in the Internet of Things?

    The article outlines the European Union (EU) regulation of information technology (IT) security in Internet of Things products from a consumer and...

    Article 16 September 2022
  15. Microsoft Teams Troubleshooting Approaches

    In this chapter, you will learn different functionalities of the Teams app, including call quality and meeting troubleshooting. Also, you will learn...
    Chapter 2020
  16. Zero Trust Security Architecture for Digital Privacy in Healthcare

    Ensuring the security and privacy of confidential medical data has become increasingly crucial with the widespread digitization of healthcare...
    Ikshit Chaturvedi, Pranav M. Pawar, ... P. S. Tamizharasan in Information Technology Security
    Chapter 2024
  17. Methods for Implementing Usable Secure Online Public Services

    This chapter presents methods for the implementation and evaluation of usable secure online public services.
    Esther Ruiz Ben, Margit Scholl in Usable Privacy and Security in Online Public Services
    Chapter 2023
  18. A Lattice-Based Single-Share Secret Sharing Scheme

    In general, in a secret sharing scheme, the dealer chooses shares and distributes them to the participants securely. For the secure communication,...

    Ramakant Kumar, Sahadeo Padhye in SN Computer Science
    Article 21 October 2023
  19. Efficient and Universally Composable Single Secret Leader Election from Pairings

    Single Secret Leader Election (SSLE) protocols allow a set of users to elect a leader among them so that the identity of the winner remains secret...
    Dario Catalano, Dario Fiore, Emanuele Giunta in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  20. Calling and media bots

    As a final chapter on bots, I could not miss the opportunity to discuss calling and media bots in Teams with you. In my opinion, they are the ones...
    Rick Van Rousselt in Pro Microsoft Teams Development
    Chapter 2021
Did you find what you were looking for? Share feedback.