Sciweavers

1931 search results - page 48 / 387
» Why we blog
Sort
View
HICSS
2009
IEEE
184views Biometrics» more  HICSS 2009»
14 years 3 months ago
Why Mobile Payments Fail? Towards a Dynamic and Multi-Perspective Explanation
Despite optimistic expectations fast diffusion of mobile payments has not taken place after a decade of trials. Several explanations to this situation have been put forward using ...
Jan Ondrus, Kalle Lyytinen, Yves Pigneur
SIGUCCS
2003
ACM
14 years 1 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah
WETICE
2006
IEEE
14 years 2 months ago
Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured?
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and selfmanage. In our approach, we...
Edward T. Chow
EACL
2006
ACL Anthology
13 years 10 months ago
Developing an Approach for Why-Question Answering
In the current project, we aim at developing an approach for automatically answering why-questions. We created a data collection for research, development and evaluation of a meth...
Suzan Verberne
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
14 years 28 days ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...