Sciweavers

6300 search results - page 37 / 1260
» We have it easy, but do we have it right
Sort
View
101
Voted
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
15 years 7 months ago
Understanding Changes in Consumer Payment Habits - Do Mobile Payments and Electronic Invoices Attract Consumers?
Mobile payment services have, thus far, failed to entice consumers. An apparent conclusion is that these services have failed to meet consumers’ payment needs. Deeper understand...
Tomi Dahlberg, Anssi Öörni
FPCA
1995
15 years 4 months ago
How Much Non-Strictness do Lenient Programs Require?
Lenient languages, such as Id90, have been touted as among the best functional languages for massively parallel machines AHN88]. Lenient evaluation combines non-strict semantics w...
Klaus E. Schauser, Seth Copen Goldstein
106
Voted
DSN
2009
IEEE
15 years 7 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
EATIS
2007
ACM
15 years 4 months ago
Protection of technological measures: juridical definition of a technical tool
The present work aims to bring to discussion and to analysis, the texts of the 6th article of the 2001/29/EC Directive (22nd of May) and the 217th article of the Portuguese law 50...
Lígia Lopes de Sousa Carreto
94
Voted
HICSS
2010
IEEE
227views Biometrics» more  HICSS 2010»
15 years 7 months ago
Do Online Reviews Reflect a Product's True Perceived Quality? - An Investigation of Online Movie Reviews Across Cultures
When does the reported average of online ratings match perceived average assessment? We apply behavioral theory to capture intentions in rating online movie reviews in two dissimi...
Noi Sian Koh, Nan Hu, Eric K. Clemons