Sciweavers

1205 search results - page 151 / 241
» Mobile product customization
Sort
View
ICSE
2012
IEEE-ACM
13 years 3 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
HICSS
2009
IEEE
137views Biometrics» more  HICSS 2009»
15 years 8 months ago
Consumer Informedness and Hyperdifferentiation: An Empirical Test of the 'Trading Down' and 'Trading Out' Hypotheses
Consumer informedness plays a critical role in determining consumer choice. Companies now use hyperdifferentiation and resonance marketing strategies to benefit from the long-tail....
Robert J. Kauffman, Ting Li, Eric van Heck, Peter ...
CCGRID
2009
IEEE
15 years 8 months ago
GenLM: License Management for Grid and Cloud Computing Environments
—Software license management allows independent software vendors (ISVs) to control the access of their products. It is a fundamental part of the ISVs’ business strategy. A wide...
Mathias Dalheimer, Franz-Josef Pfreundt
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
15 years 6 months ago
User Centred Opportunities for Supporting Consumer Behaviour Through Handheld and Ubiquitous Computing
Moving around our physical environment, we are surrounded and interact with information that exhorts and stimulates us to buy things. For most of us, not all of these impulses are...
Kenton O'Hara, Mark Perry
ISWC
1998
IEEE
15 years 5 months ago
Design for Wearability
Digital Technology is constantly improving as information becomes wireless. These advances demand more wearable and mobile form factors for products that access information. A pro...
Francine Gemperle, Chris Kasabach, John Stivoric, ...