Sciweavers

5215 search results - page 1005 / 1043
» A model of normative power
Sort
View
SPW
2004
Springer
15 years 3 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
15 years 3 months ago
Value Positions for Financial Institutions in Electronic Bill Presentment and Payment (EBPP)
Business to consumer (B2C) electronic commerce has led to new relationships connecting various supply chain partners via the Internet, significantly increasing the quantity and qu...
Alea M. Fairchild
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
15 years 3 months ago
Validating and Refining Clusters via Visual Rendering
Clustering is an important technique for understanding and analysis of large multi-dimensional datasets in many scientific applications. Most of clustering research to date has be...
Keke Chen, Ling Liu
NCA
2003
IEEE
15 years 3 months ago
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations
Numerous research efforts have produced a large number of algorithms and mechanisms for web proxy caches. In order to build powerful web proxies and understand their performance, ...
Peter Triantafillou, Ioannis Aekaterinidis
AOSD
2003
ACM
15 years 3 months ago
Quantifying aspects in middleware platforms
Middleware technologies such as Web Services, CORBA and DCOM have been very successful in solving distributed computing problems for a large family of application domains. As midd...
Charles Zhang, Hans-Arno Jacobsen
« Prev « First page 1005 / 1043 Last » Next »