Sciweavers

1617 search results - page 218 / 324
» Recommender Systems
Sort
View
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 6 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
HICSS
2007
IEEE
630views Biometrics» more  HICSS 2007»
15 years 11 months ago
The Ability-Motivation-Opportunity Framework for Behavior Research in IS
Some theoretical models used in IS research may lack explanatory power and consistency because of their failure to provide an adequate means of accounting for contextual and situa...
Jerald Hughes
118
Voted
HICSS
2009
IEEE
196views Biometrics» more  HICSS 2009»
15 years 11 months ago
Monetizing the Internet: Surely There Must be Something other than Advertising
Almost all attempts to monetize internet applications targeted at individuals to date have focused on natural extensions of traditional media or traditional retailing. Most are ei...
Eric K. Clemons
ESWS
2006
Springer
15 years 8 months ago
Interactive Ontology-Based User Knowledge Acquisition: A Case Study
On the Semantic Web personalization technologies are needed to deal with user diversity. Our research aims at maximising the automation of acquisition of user knowledge, thus provi...
Lora Aroyo, Ronald Denaux, Vania Dimitrova, Michae...
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
15 years 11 months ago
Television-Mediated Conversation: Coherence in Italian iTV SMS Chat
Text messaging on interactive television in Italy is a media convergence phenomenon involving short message service, traditional television, and the World Wide Web. This study inv...
Asta Zelenkauskaite, Susan C. Herring