-
1
-
-
79960854870
-
PEIR, the personal environmental impact report
-
June
-
M. Min, S. Reddy, K. Shilton, N. Yau, and et al. PEIR, the personal environmental impact report, Proc. 7th ACM Mobisys, June 2009.
-
(2009)
Proc. 7th ACM Mobisys
-
-
Min, M.1
Reddy, S.2
Shilton, K.3
Yau, N.4
-
2
-
-
84866497422
-
Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application
-
November
-
E. Miluzzo, N. Lane, K. Fodor, R. Peterson, and et al. Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application, Proc. 6th ACM SenSys, November 2008.
-
(2008)
Proc. 6th ACM SenSys
-
-
Miluzzo, E.1
Lane, N.2
Fodor, K.3
Peterson, R.4
-
3
-
-
57349106468
-
SeeMon: Scalable and energy-efficient context monitoring framework for sensor-rich mobile environments
-
June
-
S. Kang, J. Lee, H, Jang, H. Lee, and et al. SeeMon: scalable and energy-efficient context monitoring framework for sensor-rich mobile environments. Proc. 6th ACM MobiSys, June 2008.
-
(2008)
Proc. 6th ACM MobiSys
-
-
Kang, S.1
Lee H, J.2
Lee, J.H.3
-
5
-
-
77955627094
-
Dyads: Dynamics of dyads in social networks: Assortative, relational, and proximity mechanisms
-
Jun
-
M. T. Rivera, S. B. Soderstrom, and B. Uzzi. Dyads: Dynamics of Dyads in Social Networks: Assortative, Relational, and Proximity Mechanisms. Annual Review of Sociology, Vol. 36, pp 91-115, Jun 2010.
-
(2010)
Annual Review of Sociology
, vol.36
, pp. 91-115
-
-
Rivera, M.T.1
Soderstrom, S.B.2
Uzzi, B.3
-
6
-
-
77954988507
-
Energy-delay tradeoffs in smartphone applications
-
June
-
M. Ra, J. Paek, A. B. Sharma, R. Govindan, M. H. Krieger, and M. J. Neely. Energy-Delay Tradeoffs in Smartphone Applications. Proc. 8th ACM Mobisys, June 2010.
-
(2010)
Proc. 8th ACM Mobisys
-
-
Ra, M.1
Paek, J.2
Sharma, A.B.3
Govindan, R.4
Krieger, M.H.5
Neely, M.J.6
-
8
-
-
0003515463
-
-
Prentice Hall
-
R.K. Ahuja, T.L. Magnanti, J.B. Orlin. Network Flows: Theory, Algorithms, and Applications. Prentice Hall, 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
9
-
-
33746640569
-
Resource allocation and cross-layer control in wireless networks
-
L. Georgiadis, M. J. Neely, and L. Tassiulas. Resource allocation and cross-layer control in wireless networks. Foundations and Trends in Networking, vol. 1, no. 1, pp. 1-149, 2006.
-
(2006)
Foundations and Trends in Networking
, vol.1
, Issue.1
, pp. 1-149
-
-
Georgiadis, L.1
Neely, M.J.2
Tassiulas, L.3
-
11
-
-
44349084978
-
Developing a unifying framework of credibility assessment: Construct, heuristics, and interaction in context
-
B. Hilligoss and S. Rieh. Developing a Unifying Framework of Credibility Assessment: Construct, heuristics, and Interaction in Context. Information Processing and Management, Vol. 44, 1467-1484, 2008.
-
(2008)
Information Processing and Management
, vol.44
, pp. 1467-1484
-
-
Hilligoss, B.1
Rieh, S.2
-
12
-
-
77958414685
-
The influence of source credibility on communication effectiveness
-
C. I. Hovland and W. Weiss. The Influence of Source Credibility on Communication Effectiveness. Public Opinion Quarterly, Vol. 15, pp 635-650, 1951.
-
(1951)
Public Opinion Quarterly
, vol.15
, pp. 635-650
-
-
Hovland, C.I.1
Weiss, W.2
-
13
-
-
79952849009
-
Factors and effects of information credibility
-
Minneapolis
-
D. H. McKnight and C. J. Kacmar. Factors and Effects of Information Credibility. Proc. ICEC'07, Minneapolis, 2007.
-
(2007)
Proc. ICEC'07
-
-
McKnight, D.H.1
Kacmar, C.J.2
-
14
-
-
79960882289
-
The elements of computer credibility
-
B. J. Fogg and H. Tseng. The Elements of Computer Credibility. Proc. CHI'99, 2004.
-
(2004)
Proc. CHI'99
-
-
Fogg, B.J.1
Tseng, H.2
|