Sciweavers

1694 search results - page 67 / 339
» ECommerce
Sort
View
SAFECOMP
2007
Springer
15 years 6 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
ISCN
2006
IEEE
15 years 5 months ago
An optimistic fair e-commerce protocol for large e-goods
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want ...
Cagil Can Oniz, Erkay Savas, Albert Levi
WECWIS
2005
IEEE
157views ECommerce» more  WECWIS 2005»
15 years 5 months ago
A Recommender for Targeted Advertisement of Unsought Products in E-Commerce
Recommender systems are a powerful tool for promoting sales in electronic commerce. An effective shopping recommender system can help boost the retailer’s sales by reminding cus...
Koung-Lung Lin, Jane Yung-jen Hsu, Han-Shen Huang,...
WECWIS
2005
IEEE
141views ECommerce» more  WECWIS 2005»
15 years 5 months ago
An Adaptive Bilateral Negotiation Model for E-Commerce Settings
This paper studies adaptive bilateral negotiation between software agents in e-commerce environments. Specifically, we assume that the agents are self-interested, the environment...
Vidya Narayanan, Nicholas R. Jennings
DIS
2004
Springer
15 years 5 months ago
Product Recommendation in e-Commerce Using Direct and Indirect Confidence for Historical User Sessions
Product recommendation is an important part of current electronic commerce. Useful, direct and indirect relationships between pages, especially product home pages in an e-commerce ...
Przemyslaw Kazienko