Sciweavers

4486 search results - page 889 / 898
» Cross-Evaluation: A new model for information system evaluat...
Sort
View
ICFP
2005
ACM
14 years 7 months ago
Continuations from generalized stack inspection
Implementing first-class continuations can pose a challenge if the target machine makes no provisions for accessing and re-installing the run-time stack. In this paper, we present...
Greg Pettyjohn, John Clements, Joe Marshall, Shrir...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 1 months ago
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction
The online auction is a well-known business model that shows how business can be changed with the aid of new technologies. On the other hand, although the online auction allows bu...
Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byung...
HICSS
2002
IEEE
106views Biometrics» more  HICSS 2002»
14 years 12 days ago
Satisfaction with Internet-Based Services
: This research develops, operationalizes, and empirically tests a model for explaining/predicting the satisfaction of customers with Internet-based services in the context of an o...
Mohamed Khalifa, Vanessa Liu
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
14 years 1 days ago
Parallel community detection on large networks with propinquity dynamics
Graphs or networks can be used to model complex systems. Detecting community structures from large network data is a classic and challenging task. In this paper, we propose a nove...
Yuzhou Zhang, Jianyong Wang, Yi Wang, Lizhu Zhou
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung