Sciweavers

562 search results - page 80 / 113
» Agent-Mediated Electronic Commerce
Sort
View
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
14 years 8 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
CHI
2008
ACM
14 years 8 months ago
From meiwaku to tokushita!: lessons for digital money design from japan
Based on ethnographically-inspired research in Japan, we report on people's experiences using digital money payment systems that use Sony's FeliCa near-field communicati...
Scott D. Mainwaring, Wendy March, Bill Maurer
CHI
2005
ACM
14 years 8 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
SIGMOD
2004
ACM
154views Database» more  SIGMOD 2004»
14 years 7 months ago
Computing Clusters of Correlation Connected Objects
The detection of correlations between different features in a set of feature vectors is a very important data mining task because correlation indicates a dependency between the fe...
Christian Böhm, Karin Kailing, Peer Krög...
ICWS
2009
IEEE
14 years 4 months ago
Distributed Cross-Domain Change Management
Distributed systems increasingly span organizational boundaries and, with this, system and service management domains. Web services are the primary means of exposing services to c...
Bruno Wassermann, Heiko Ludwig, Jim Laredo, Kamal ...