Sciweavers

791 search results - page 63 / 159
» Users and Trust in Cyberspace
Sort
View
IUI
2009
ACM
14 years 4 months ago
Fixing the program my computer learned: barriers for end users, challenges for the machine
The results of a machine learning from user behavior can be thought of as a program, and like all programs, it may need to be debugged. Providing ways for the user to debug it mat...
Todd Kulesza, Weng-Keen Wong, Simone Stumpf, Steph...
APSCC
2009
IEEE
14 years 2 months ago
Selecting Web services based on past user experiences
Since the Internet of Services (IoS) is becoming reality, there is an inherent need for novel service selection mechanisms, which work in spite of large numbers of alternative ser...
Philipp Leitner, Anton Michlmayr, Florian Rosenber...
IPPS
2003
IEEE
14 years 29 days ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
ICDCS
2005
IEEE
14 years 1 months ago
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem wi...
Aldar C.-F. Chan, Ian F. Blake
MIDDLEWARE
2010
Springer
13 years 6 months ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...