Sciweavers

1422 search results - page 143 / 285
» A Framework for Understanding Botnets
Sort
View
PET
2009
Springer
15 years 8 months ago
Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design
This research analyzes consumer privacy issues pertaining to the newly developing wireless marketing context, specifically, wireless advertising messaging (WAM). We develop a conce...
Heng Xu, John W. Bagby, Terence Ryan Melonas
ASP
2001
Springer
15 years 8 months ago
A Declarative Implementation of Planning with Control
Being able to declaratively specify control within a planning (or theorem-proving) paradigm is necessary if we are to build intelligent machines. This paper introduces an implemen...
Aarati Parmar
DIS
2001
Springer
15 years 8 months ago
Knowledge Navigation on Visualizing Complementary Documents
Abstract. It is an up-to-date challenge to get answers for novel questions which nobody has ever considered. Such a question is too rare to be satisfied with a past single documen...
Naohiro Matsumura, Yukio Ohsawa, Mitsuru Ishizuka
ADC
2000
Springer
146views Database» more  ADC 2000»
15 years 8 months ago
Handling Dynamic Schema Change in Process Models
Workflow technology has emerged as an appropriate platform for consolidating the distributed information resources of an enterprise, promoting interoperability across cross-platfo...
Shazia W. Sadiq
CHI
1999
ACM
15 years 8 months ago
The Elements of Computer Credibility
Given the importance of credibility in computing products, the research on computer credibility is relatively small. To enhance knowledge about computers and credibility, we defin...
B. J. Fogg, Hsiang Tseng