Sciweavers

192 search results - page 13 / 39
» Who gets spammed
Sort
View
ICDE
2007
IEEE
124views Database» more  ICDE 2007»
14 years 1 months ago
Secure Content Validation
Information dissemination in electronic form has improved drastically over the past few years. New technologies in web feeds allow the uses to get notified automatically when new...
Mummoorthy Murugesan, Wei Jiang
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
12 years 3 months ago
Do Me a Solid? Information Asymmetry, Liking, and Compliance Gaining Online
As the popularity of interactive social media grows, it is increasingly normal for individuals to reveal significant amounts of personal information online. Although this informat...
Nathan J. Claes, Carolyn Hurley, Michael A. Stefan...
CIA
1999
Springer
13 years 11 months ago
Mobile-Agent Mediated Place Oriented Communication
When we communicate with others in a most primitive way like face-to-face conversation, we normally gather at a common physical place. This physical constraint has been recognized ...
Yasuhiko Kitamura, Yasuhiro Mawarimichi, Shoji Tat...
HICSS
2007
IEEE
114views Biometrics» more  HICSS 2007»
14 years 1 months ago
Consumers' Interest in Personalized Recommendations: The Role of Product-Involvement and Opinion Seeking
The best recommender system is useless if consumers are not interested in its recommendations. Hence it is vital for e-commerce operators who apply recommender systems to get insi...
Nicolas Knotzer, Maria Madlberger
ICDIM
2007
IEEE
14 years 1 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel