Sciweavers

264 search results - page 45 / 53
» Transaction level modeling: an overview
Sort
View
ECIS
2001
13 years 8 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke
CCR
2010
131views more  CCR 2010»
13 years 7 months ago
DECOR: DEClarative network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundament...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
DSS
2006
74views more  DSS 2006»
13 years 7 months ago
Second opinions and online consultations
Consumers increasingly obtain direct consultations from experts, thanks to the prevalent use of Information Technology and the Internet. Motivated by the online consultation pract...
Zafer D. Ozdemir, M. Tolga Akçura, Kemal Al...
CJ
2010
131views more  CJ 2010»
13 years 4 months ago
Turning Back Time - What Impact on Performance?
Consistent with the divide-and-conquer approach to problem solving, a recursive result is presented in the domain of stochastic modelling that derives product-form solutions for t...
Peter G. Harrison
ISR
2010
13 years 2 months ago
Use of Pricing Schemes for Differentiating Information Goods
Information goods vendors offer different pricing schemes such as per user pricing and site licensing. Why do competing sellers adopt different pricing schemes for the same inform...
Vidyanand Choudhary