Sciweavers

340 search results - page 24 / 68
» Optimal marketing strategies over social networks
Sort
View
ICIS
2000
13 years 8 months ago
Initial trust, perceived risk, and the adoption of internet banking
Studieson the adoptionof business-to-consumere-commerce have not simultaneouslyconsideredtrust and risk as important determinants of adoption behavior. Further, trust in informati...
Kyung Kyu Kim, Bipin Prabhakar
ICC
2009
IEEE
129views Communications» more  ICC 2009»
14 years 2 months ago
Do Next Generation Networks Need Path Diversity?
—We have currently reached a phase where big shifts in the network traffic might impose to rethink the design of current architectures, and where new technologies, being pushed ...
Luca Muscariello, Diego Perino, Dario Rossi
CIG
2005
IEEE
14 years 1 months ago
Synchronous and Asynchronous Network Evolution in a Population of Stubborn Prisoners
— We study by computer simulation a population of individuals playing the prisoner’s dilemma game. Each player has an invariable strategy (cooperate or defect) but the network ...
Leslie Luthi, Mario Giacobini, Marco Tomassini
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 1 months ago
A Stochastic Framework for Scheduling in Wireless Packet Access Networks
— We put forth a unified framework for downlink and uplink scheduling of multiple connections with diverse qualityof-service requirements, where each connection transmits using ...
Xin Wang, Georgios B. Giannakis
CEAS
2008
Springer
13 years 9 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao