Sciweavers

2363 search results - page 356 / 473
» How Secure is RFID
Sort
View
IIWAS
2003
15 years 6 months ago
The Effect of Information Seeking Behavior on an Online Purchase Intention
This paper reports a research in progress to study the effect of information seeking behavior on an online purchase intention. There are several strategies people use to find info...
Paulus Insap Santosa
125
Voted
SNPD
2004
15 years 6 months ago
Payment-Based Email
Spam is a major problem facing email today, and current solutions are ineffective. This paper presents our progress towards defining and implementing a payment-based email deliver...
David A. Turner, Ni Deng
USENIX
2003
15 years 6 months ago
A Multi-User Virtual Machine
Recent efforts aimed at improving the scalability of the JavaTM platform have focused primarily on the safe collocation of multiple applications in the virtual machine. This is of...
Grzegorz Czajkowski, Laurent Daynès, Ben Ti...
129
Voted
DSS
2008
97views more  DSS 2008»
15 years 5 months ago
On supply chain cash flow risks
This study models the supply chain related cash flow risks for a business entity measured by the standard deviations of cash inflows, outflows, and netflows of each period in a pl...
Chih-Yang Tsai
127
Voted
IJOE
2008
107views more  IJOE 2008»
15 years 5 months ago
SOA Meets Robots - A Service-Based Software Infrastructure for Remote Laboratories
With the ongoing internationalization of virtual laboratories, the integration of such infrastructures becomes more important. The meanwhile commonly accepted 'glue' for...
Peter Tröger, Andreas Rasche, Frank Feinbube,...