Sciweavers

6147 search results - page 76 / 1230
» Requirements, Architectures and Risks
Sort
View
CEC
2007
IEEE
15 years 6 months ago
Repository method to suit different investment strategies
— This work is motivated by the interest in finding significant movements in financial stock prices. The detection of such movements is important because these could represent...
Alma Lilia Garcia-Almanza, Edward P. K. Tsang
SIGECOM
2010
ACM
152views ECommerce» more  SIGECOM 2010»
15 years 4 months ago
Information aggregation in smooth markets
Recent years have seen extensive investigation of the information aggregation properties of prediction markets. However, relatively little is known about conditions under which a ...
Krishnamurthy Iyer, Ramesh Johari, Ciamac Cyrus Mo...
DIM
2009
ACM
15 years 4 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
IADIS
2003
15 years 1 months ago
E-Technology V E-Law: Legal Challenges to the Information Society
In the area of electronic and mobile commerce there are unique legal risks as well as concerns that apply to traditional businesses. Various laws have been successfully applied to...
Elaine Lawrence, Gordana Culjak, John Lawrence
ELECTRONICMARKETS
2000
81views more  ELECTRONICMARKETS 2000»
14 years 11 months ago
On Auctions as the Negotiation Paradigm of Electronic Markets
Until recently, electronic markets were dominated by the combination of static offer schemes and fixed pricing. Static offer schemes such as online catalogues apparently bear the ...
Michael Ströbel