Sciweavers

859 search results - page 128 / 172
» The Changing Face of Cryptography
Sort
View
PERSUASIVE
2007
Springer
15 years 6 months ago
Toward a Systematic Understanding of Suggestion Tactics in Persuasive Technologies
The unique capabilities of mobile, context-aware, networked devices make them an interesting platform for applying suggestion in persuasive technologies. Because these devices are ...
Adrienne H. Andrew, Gaetano Borriello, James Fogar...
POLICY
2007
Springer
15 years 6 months ago
Proteus: A Semantic Context-Aware Adaptive Policy Model
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
Alessandra Toninelli, Rebecca Montanari, Lalana Ka...
VLDB
2007
ACM
112views Database» more  VLDB 2007»
15 years 6 months ago
A Generic solution for Warehousing Business Process Data
Improving business processes is critical to any corporation. Process improvement requires analysis as its first basic step. Process analysis has many unique challenges: i) compani...
Fabio Casati, Malú Castellanos, Umeshwar Da...
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
15 years 5 months ago
Network Effects and Technology Licensing
A paramount question faced by technology innovators is whether to license an innovation to other firms, and if so, what type of license it should use. Information technology innov...
Lihui Lin, Nalin Kulatilaka
ICALT
2006
IEEE
15 years 5 months ago
Plagiarism in e-Learning Systems: Identifying and Solving the Problem for Practical Assignments
A big part of life long learning is the move from residential lectures to distance education. Distance education falls under the multi-modal policy of the teaching institution and...
Emil Marais, Ursula Minnaar, David Argles