This paper reports a research in progress to study the effect of information seeking behavior on an online purchase intention. There are several strategies people use to find info...
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
: The Third Generation (3G) cellular networks provide ubiquitous connectivity but low data rates, whereas Wireless Local Area Networks (WLANs) can offer much higher data rates but ...
This study examines the attitudes of adopters and non-adopters toward Internet stock trading in Singapore. Data were collected using a web-based questionnaire survey. Usable respon...
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...