Sciweavers

220 search results - page 26 / 44
» Trusted business system model using context sensitiveness
Sort
View
CHI
2005
ACM
14 years 8 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
CAISE
2009
Springer
13 years 5 months ago
Developing Quality Management Systems with DEMO
The International Organization for Standardization (ISO) has defined Quality Management, but it has not yet adopted standards for developing Quality Management Systems (QMSs), nota...
Jos Geskus, Jan L. G. Dietz
BMCBI
2010
121views more  BMCBI 2010»
13 years 2 months ago
G-stack modulated probe intensities on expression arrays - sequence corrections and signal calibration
Background: The brightness of the probe spots on expression microarrays intends to measure the abundance of specific mRNA targets. Probes with runs of at least three guanines (G) ...
Mario Fasold, Peter F. Stadler, Hans Binder
IADIS
2004
13 years 9 months ago
A Model of E-Commerce for the Highly Valuable Traditional Products in Thailand
As e-commerce is considered an excellent alternative for business to reach new customers, interests in design principles for e-commerce websites, are increasing. However, not many...
Sakuna Vanichvisuttikul, Chamnong Jungthirapanich
INFOCOM
2006
IEEE
14 years 1 months ago
Using Repeated Games to Design Incentive-Based Routing Systems
Abstract— Incorporating pricing information in routing systems has been explored in various contexts and fashions. In this paper we examine certain fundamental properties importa...
Michael Afergan