Sciweavers

1776 search results - page 190 / 356
» Informational cascades in IT adoption
Sort
View
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
15 years 8 months ago
Taking Charge of Your Health: The Drivers of Enrollment and Continued Participation in Online Health Intervention Programs
Information technology (IT) is fundamentally altering the way in which healthcare is delivered to consumers, and offers the promise of improving patient safety, reducing medical e...
Jie-Mein Goh, Ritu Agarwal
IEEEIAS
2008
IEEE
15 years 8 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
ADC
2008
Springer
112views Database» more  ADC 2008»
15 years 8 months ago
Semantics based Buffer Reduction for Queries over XML Data Streams
With respect to current methods for query evaluation over XML data streams, adoption of certain types of buffering techniques is unavoidable. Under lots of circumstances, the buff...
Chi Yang, Chengfei Liu, Jianxin Li, Jeffrey Xu Yu,...
IAT
2007
IEEE
15 years 8 months ago
Privacy Loss in Classical Multiagent Planning
Privacy is often cited as the main reason to adopt a multiagent approach for a certain problem. This also holds true for multiagent planning. Still, papers on multiagent planning ...
Roman van der Krogt
ICDIM
2007
IEEE
15 years 8 months ago
Accessibility and scalability in collaborative eCommerce environments
The Much advancement has lately occurred in eCommerce systems’ interfaces. Product specifications listings combined with pictures is no longer considered the benchmark for eComm...
Michel Khoury, Shervin Shirmohammadi