Sciweavers

518 search results - page 87 / 104
» Client Side Personalization
Sort
View
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
14 years 17 days ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
CSREASAM
2008
13 years 9 months ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
BMCBI
2010
132views more  BMCBI 2010»
13 years 7 months ago
Next generation tools for genomic data generation, distribution, and visualization
Background: With the rapidly falling cost and availability of high throughput sequencing and microarray technologies, the bottleneck for effectively using genomic analysis in the ...
David A. Nix, Tonya L. Di Sera, Brian K. Dalley, B...
INTERNET
2007
182views more  INTERNET 2007»
13 years 7 months ago
Analysis of Caching and Replication Strategies for Web Applications
Replication and caching mechanisms are often employed to enhance the performance of Web applications. In this article, we present a qualitative and quantitative analysis of state-...
Swaminathan Sivasubramanian, Guillaume Pierre, Maa...
KBSE
2010
IEEE
13 years 6 months ago
Solving string constraints lazily
Decision procedures have long been a fixture in program analysis, and reasoning about string constraints is a key element in many program analyses and testing frameworks. Recent ...
Pieter Hooimeijer, Westley Weimer