Sciweavers

1117 search results - page 177 / 224
» A Compliance Model of Trust
Sort
View
OWLED
2007
15 years 1 months ago
Extending Fuzzy Description Logics for the Semantic Web
Fuzzy Description Logics (Fuzzy DLs) and fuzzy OWL have been proposed as languages able to represent and reason about imprecise and vague knowledge. Such extensions have gained con...
Giorgos Stoilos, Giorgos B. Stamou
ICIS
2001
15 years 1 months ago
Looking Without Seeing: Understanding Unsophisticated Consumers' Success and Failure to Detect Internet Deception
Do unsophisticated consumers fall prey to Internet consumer frauds? Why? To answer these questions this paper integrates two streams of empirical research: the process-oriented th...
Stefano Grazioli, Alex Wang
GECCO
2010
Springer
225views Optimization» more  GECCO 2010»
15 years 2 days ago
Comparison of NEWUOA with different numbers of interpolation points on the BBOB noiseless testbed
In this paper, we study the performances of the NEW Unconstrained Optimization Algorithm (NEWUOA) with different numbers of interpolation points. NEWUOA is a trust region method, ...
Raymond Ros
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 12 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
PUC
2008
99views more  PUC 2008»
14 years 11 months ago
An empirical investigation of mobile ticketing service adoption in public transportation
In this paper, we present results from a study of mobile ticketing service adoption in public transportation. The theoretical background of the study is based on technology adoptio...
Niina Mallat, Matti Rossi, Virpi Kristiina Tuunain...