Sciweavers

829 search results - page 81 / 166
» Adverse selection in online
Sort
View
JCM
2007
143views more  JCM 2007»
14 years 11 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
JECR
2002
129views more  JECR 2002»
14 years 11 months ago
The Self-Confrontation Interview: Towards an Enhanced Understanding of Human Factors in Web-based Interaction for Improved Websi
An in-depth understanding of human factors in web-based interaction requires a methodology which enables researchers to chart online actions, understand the cognitive processes gu...
Sun Lim
CORR
2010
Springer
286views Education» more  CORR 2010»
14 years 8 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
RECSYS
2009
ACM
15 years 4 months ago
Matching information content with music
This work addresses a particular kind of cross domain personalization task consisting of selecting simultaneously two items in two different domains and recommending them togethe...
Marius Kaminskas
HT
2007
ACM
15 years 3 months ago
The evolution of authorship in a remix society
Authorship entails the constrained selection or generation of media and the organization and layout of that media in a larger structure. But authorship is more than just selection...
Nicholas Diakopoulos, Kurt Luther, Yevgeniy Eugene...