Sciweavers

446 search results - page 27 / 90
» Modeling trust in e-commerce: an approach based on user requ...
Sort
View
CCS
2009
ACM
15 years 4 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
ICWE
2009
Springer
15 years 6 months ago
Patterns for the Model-Based Development of RIAs
Rich Internet Applications (RIAs) are highly interactive web applications that resemble desktop applications. Modeling RIAs hence requires techniques for web modeling enriched by m...
Nora Koch, Matthias Pigerl, Gefei Zhang, Tatiana M...
PRIMA
2007
Springer
15 years 6 months ago
An Agent Modeling Method Based on Scenario Rehearsal for Multiagent Simulation
Multiagent Systems are potential computational systems for various practical applications, tools, and so on. Multiagent simulation is one of the remarkable application to evaluate ...
Shohei Yamane, Toru Ishida
DASFAA
2005
IEEE
137views Database» more  DASFAA 2005»
15 years 5 months ago
A General Approach to Mining Quality Pattern-Based Clusters from Microarray Data
Abstract. Pattern-based clustering has broad applications in microarray data analysis, customer segmentation, e-business data analysis, etc. However, pattern-based clustering often...
Daxin Jiang, Jian Pei, Aidong Zhang
PERCOM
2005
ACM
15 years 11 months ago
Applying a Disciplined Approach to the Development of a Context-Aware Communication Application
Pervasive computing applications must be engineered to provide unprecedented levels of flexibility in order to reconfigure and adapt in response to changes in computing resources ...
Ted McFadden, Karen Henricksen, Jadwiga Indulska, ...