Sciweavers

86 search results - page 11 / 18
» A framework for understanding mobile internet motivations an...
Sort
View
ICEB
2004
279views Business» more  ICEB 2004»
13 years 9 months ago
Adaptive User Interfaces for Intelligent E-Learning: Issues and Trends
Adaptive User Interfaces have a long history rooted in the emergence of such eminent technologies as Artificial Intelligence, Soft Computing, Graphical User Interface, JAVA, Inter...
Abdul Rahim Ahmad, Otman A. Basir, Khaled Hassanei...
INFOSCALE
2006
ACM
14 years 1 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 5 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
ICWSM
2009
13 years 5 months ago
Trust Incident Account Model: Preliminary Indicators for Trust Rhetoric and Trust or Distrust in Blogs
This paper defines a concept of trust incident accounts as verbal reports of empirical episodes in which a trustor has reached a state of positive or negative expectations of a tr...
Victoria L. Rubin
REFLECTION
2001
Springer
14 years 6 days ago
Separation of Concerns in Mobile Agent Applications
Abstract. Using mobile agent systems, cooperative distributed applications that run over the Internet can be constructed flexibly. However, there are some problems: it is difficul...
Naoyasu Ubayashi, Tetsuo Tamai