Sciweavers

20 search results - page 4 / 4
» ecr 2010
Sort
View
ECR
2006
107views more  ECR 2006»
13 years 5 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
ECR
2002
95views more  ECR 2002»
13 years 5 months ago
Motivating Human-Agent Interaction: Transferring Insights from Behavioral Marketing to Interface Design
The understanding of consumer interaction with online EC Websites is one of the big current challenges for online marketers. The present paper investigates what drives and impedes...
Sarah Spiekermann, Corina Paraschiv
ECR
2002
160views more  ECR 2002»
13 years 5 months ago
A New Micro-Payment System Using General Payword Chain
In recent years electronic commerce has grown rapidly as Internet and web technologies have progressed. Therefore, a secure and efficient payment system for general-purpose applic...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
ECR
2007
116views more  ECR 2007»
13 years 5 months ago
Enabling assisted strategic negotiations in actual-world procurement scenarios
In the everyday business world, the sourcing process of multiple goods and services usually involves complex negotiations (via telephone, fax, etc) that include discussion of prod...
Jesús Cerquides, Maite López-S&aacut...
ECR
2010
129views more  ECR 2010»
13 years 5 months ago
The design of a reliable reputation system
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero...
Gayatri Swamynathan, Kevin C. Almeroth, Ben Y. Zha...