Sciweavers

29 search results - page 6 / 6
» End User Acceptance of Security Technology for Electronic Co...
Sort
View
AGENTS
2000
Springer
13 years 9 months ago
Experimental assessment of the effectiveness of synthetic personae for multi-modal e-retail applications
This paper details results of an experiment to empirically evaluate the effectiveness and user acceptability of human-like synthetic agents in a multi-modal electronic retail scen...
Helen McBreen, Paul Shade, Mervyn A. Jack, Peter J...
CEAS
2007
Springer
13 years 11 months ago
A Case for a Spam-Aware Mail Server Architecture
The current mail server architecture spawns a new process upon every new connection it receives. The new process deals with the handling of the mail from accepting “Helo” info...
Abhinav Pathak, Sabyasachi Roy, Y. Charlie Hu
OOPSLA
2004
Springer
13 years 10 months ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
EDBT
2004
ACM
139views Database» more  EDBT 2004»
14 years 5 months ago
GRIDS, Databases, and Information Systems Engineering Research
GRID technology, emerging in the late nineties, has evolved from a metacomputing architecture towards a pervasive computation and information utility. However, the architectural de...
Keith G. Jeffery