Sciweavers

1805 search results - page 288 / 361
» A Theory of Closure Operators
Sort
View
IIWAS
2008
15 years 5 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang
ISSA
2008
15 years 5 months ago
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing
The approach to information security governance has predominantly followed a functionalist paradigm with emphasis placed on formalized rule structures and policy frameworks. The a...
Kennedy Njenga, Irwin Brown
OWLED
2008
15 years 5 months ago
Enhancing Web Portals with Ontology-Based Data Access: The Case Study of South Africa's Accessibility Portal for People with Dis
Abstract. Web portal software is relatively easy to set up and populate from the perspective of the end-user, but it leaves the back-end database devoid of subject domain semantics...
C. Maria Keet, Ronell Alberts, Aurona Gerber, Gibs...
AAAI
2006
15 years 5 months ago
From the Programmer's Apprentice to Human-Robot Interaction: Thirty Years of Research on Human-Computer Collaboration
We summarize the continuous thread of research we have conducted over the past thirty years on human-computer collaboration. This research reflects many of the themes and issues i...
Charles Rich, Candace L. Sidner
FORTE
2004
15 years 5 months ago
A Minimal Market Model in Ephemeral Markets
Abstract Peer-to-peer markets going mobile spur spontaneity in trading considerably. Spontaneity, however, imposes severe informational requirements on the market participants. Inf...
Daniel Rolli, Dirk Neumann, Christof Weinhardt