Sciweavers

384 search results - page 66 / 77
» A Survey of Watermarking Security
Sort
View
IIWAS
2003
13 years 9 months ago
The Effect of Information Seeking Behavior on an Online Purchase Intention
This paper reports a research in progress to study the effect of information seeking behavior on an online purchase intention. There are several strategies people use to find info...
Paulus Insap Santosa
TASE
2008
IEEE
13 years 7 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
IJWMC
2007
103views more  IJWMC 2007»
13 years 7 months ago
Interworking of 3G cellular networks and wireless LANs
: The Third Generation (3G) cellular networks provide ubiquitous connectivity but low data rates, whereas Wireless Local Area Networks (WLANs) can offer much higher data rates but ...
Wei Song, Weihua Zhuang, Aladdin Saleh
BEHAVIOURIT
2004
122views more  BEHAVIOURIT 2004»
13 years 7 months ago
Adopters and non-adopters of internet stock trading in Singapore
This study examines the attitudes of adopters and non-adopters toward Internet stock trading in Singapore. Data were collected using a web-based questionnaire survey. Usable respon...
Thompson S. H. Teo, Margaret Tan, Suat Nee Peck
DCC
2000
IEEE
13 years 7 months ago
Discrete Logarithms: The Past and the Future
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Andrew M. Odlyzko