Sciweavers

3581 search results - page 44 / 717
» Modeling the Internet
Sort
View
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
14 years 1 days ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
ICIS
2000
13 years 9 months ago
Initial trust, perceived risk, and the adoption of internet banking
Studieson the adoptionof business-to-consumere-commerce have not simultaneouslyconsideredtrust and risk as important determinants of adoption behavior. Further, trust in informati...
Kyung Kyu Kim, Bipin Prabhakar
JCIT
2007
91views more  JCIT 2007»
13 years 7 months ago
A Tool to Personalize the Ranking of the Documents Returned by an Internet Search Engine
Internet search engines identify web pages that contain user-specified keywords, and then rank these pages according to their (heuristically assessed) relevance to the user’s qu...
Wadee S. Alhalabi, Miroslav Kubat, Moiez A. Tapia
ICIS
2001
13 years 9 months ago
Looking Without Seeing: Understanding Unsophisticated Consumers' Success and Failure to Detect Internet Deception
Do unsophisticated consumers fall prey to Internet consumer frauds? Why? To answer these questions this paper integrates two streams of empirical research: the process-oriented th...
Stefano Grazioli, Alex Wang
MASCOTS
2003
13 years 9 months ago
Small-World Characteristics of the Internet and Multicast Scaling
Recent work has shown that the physical connectivity of the Internet exhibits small-world behavior. Characterizing such behavior is important not only for generating realistic Int...
Shudong Jin, Azer Bestavros