Sciweavers

1573 search results - page 100 / 315
» Strong User Authentication
Sort
View
WECWIS
1999
IEEE
111views ECommerce» more  WECWIS 1999»
15 years 2 months ago
A Quantitative Analysis of the User Behavior of a Large E-Broker
The Internet and the World Wide Web provide a global virtual marketplace. However, there is little information about the behavior of e-commerce users worldwide. The goal of the pa...
Virgilio Almeida, Wagner Meira Jr., Victor F. Ribe...
SAGT
2010
Springer
151views Game Theory» more  SAGT 2010»
14 years 8 months ago
On the Existence of Optimal Taxes for Network Congestion Games with Heterogeneous Users
Abstract. We consider network congestion games in which a finite number of non-cooperative users select paths. The aim is to mitigate the inefficiency caused by the selfish users...
Dimitris Fotakis, George Karakostas, Stavros G. Ko...
WWW
2008
ACM
15 years 10 months ago
Mining the search trails of surfing crowds: identifying relevant websites from user activity
The paper proposes identifying relevant information sources from the history of combined searching and browsing behavior of many Web users. While it has been previously shown that...
Mikhail Bilenko, Ryen W. White
CLOUD
2010
ACM
15 years 3 months ago
Hermes: clustering users in large-scale e-mail services
Hermes is an optimization engine for large-scale enterprise e-mail services. Such services could be hosted by a virtualized e-mail service provider, or by dedicated enterprise dat...
Thomas Karagiannis, Christos Gkantsidis, Dushyanth...
HCI
2007
14 years 11 months ago
Designers' Perceptions of Methods of Involving and Understanding Users
Numerous methods have been developed to help designers to understand and consider the needs and desires of end-users, but many have had limited uptake in design practice. In order ...
Joy Goodman, Susannah Clarke, Patrick Langdon, P. ...