Sciweavers

585 search results - page 81 / 117
» Blind Electronic Commerce
Sort
View
WWW
2001
ACM
14 years 8 months ago
A License Management Model to Support B2C and C2C Music Sharing
Digital Rights Management (DRM) technology ensures protection of rights on distributed music over the Internet. Existing DRM systems emphasize the protection on Businessto-Consume...
Sai Ho Kwok, Siu Man Lui
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
14 years 8 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
CHI
2008
ACM
14 years 8 months ago
From meiwaku to tokushita!: lessons for digital money design from japan
Based on ethnographically-inspired research in Japan, we report on people's experiences using digital money payment systems that use Sony's FeliCa near-field communicati...
Scott D. Mainwaring, Wendy March, Bill Maurer
CHI
2005
ACM
14 years 8 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
SIGMOD
2004
ACM
154views Database» more  SIGMOD 2004»
14 years 7 months ago
Computing Clusters of Correlation Connected Objects
The detection of correlations between different features in a set of feature vectors is a very important data mining task because correlation indicates a dependency between the fe...
Christian Böhm, Karin Kailing, Peer Krög...