Sciweavers

2454 search results - page 395 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CEAS
2008
Springer
14 years 12 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
ECOWS
2006
Springer
14 years 12 months ago
Parallel Web Service Composition in MoSCoE: A Choreography-Based Approach
We present a goal-driven approach to model a choreographer for realizing composite Web services. In this framework, the users start with an abstract, and possibly incomplete funct...
Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasa...
IMC
2007
ACM
14 years 11 months ago
Towards network triangle inequality violation aware distributed systems
Many distributed systems rely on neighbor selection mechanisms to create overlay structures that have good network performance. These neighbor selection mechanisms often assume th...
Guohui Wang, Bo Zhang, T. S. Eugene Ng
AIM
2006
14 years 11 months ago
Experimenting with ICT-intensive public and private collaboration projects: The canadian experience
This research examines nine ICT-intensive and innovative projects involving both public and private sectors in the delivery of public services and attempts to identify their main c...
Lise Préfontaine, L. Ricard, Hél&egr...
MC
2001
116views Computer Science» more  MC 2001»
14 years 11 months ago
Emotions and Multimodal Interface-Agents: A Sociological View
Designing human-computer interfaces that are easy and intuitive to use is important for the use of computer technology in general. Due to the growing complexity of information sys...
Daniel Moldt, Christian von Scheve