Sciweavers

10577 search results - page 2045 / 2116
» Active Data Mining
Sort
View
ACMICEC
2007
ACM
303views ECommerce» more  ACMICEC 2007»
15 years 1 months ago
Impact of social influence in e-commerce decision making
Purchasing decisions are often strongly influenced by people who the consumer knows and trusts. Moreover, many online shoppers tend to wait for the opinions of early adopters befo...
Young Ae Kim, Jaideep Srivastava
ELPUB
2007
ACM
15 years 1 months ago
Openness in Higher Education: Open Source, Open Standards, Open Access
For national advisory services in the UK (UKOLN, CETIS, and OSS Watch), varieties of openness (open source software, open standards, and open access to research publications and d...
Brian Kelly, Scott Wilson, Randy Metcalfe
EMNETS
2007
15 years 1 months ago
Image browsing, processing, and clustering for participatory sensing: lessons from a DietSense prototype
Imagers are an increasingly significant source of sensory observations about human activity and the urban environment. ImageScape is a software tool for processing, clustering, an...
Sasank Reddy, Andrew Parker, Josh Hyman, Jeff Burk...
FDL
2007
IEEE
15 years 1 months ago
Transaction Level Modelling: A reflection on what TLM is and how TLMs may be classified
Transaction-level modelling (TLM) is a poorlyterm, promising a level of abstraction like RTL (register transfer level), where the key feature is a `transaction'. But unlike r...
Mark Burton, James Aldis, Robert Günzel, Wolf...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 1 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
« Prev « First page 2045 / 2116 Last » Next »