Sciweavers

565 search results - page 68 / 113
» A Study on Successful Business Intelligence Systems in Pract...
Sort
View
125
Voted
IPPS
2003
IEEE
15 years 6 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
CEAS
2008
Springer
15 years 3 months ago
Toward a stochastic speech act model of email behavior
Human interpersonal face-to-face interaction can be considered in terms of successions of speech acts. These are utterances which contain an intention, and the act of creating an ...
John Mildinhall, Jan Noyes
ATAL
2010
Springer
15 years 2 months ago
Learning multirobot joint action plans from simultaneous task execution demonstrations
The central problem of designing intelligent robot systems which learn by demonstrations of desired behaviour has been largely studied within the field of robotics. Numerous archi...
Murilo Fernandes Martins, Yiannis Demiris
IJISTA
2010
109views more  IJISTA 2010»
14 years 12 months ago
BKCAS: a distributed context-aware pervasive information system to support user roaming
- Over the last few years, Pervasive Computing has become a very active research topic in both academia and industry. In spite of its undeniable benefit, until recently, the wide d...
Nguyen Chan Hung, Vu Thanh Vinh, Nguyen Huu Thang,...
127
Voted
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
15 years 6 months ago
The Influence of the Meaning of Pictures and Words on Web Page Recognition Performance
Firms spend high sums trying to make their “home” page as memorable as possible to attract repeat visits. For this purpose, fancy pictures and words are used to catch the atte...
Enrique Mu, Dennis F. Galletta