-
1
-
-
23044484863
-
The computer for the 21st century
-
ACM New York, NY, USA
-
M. Weiser, "The computer for the 21st century, Mobile Computing and Communications Review, " ACM New York, NY, USA, vol. 3, n.3, pp.3-11, 1999.
-
(1999)
Mobile Computing and Communications Review
, vol.3
, Issue.3
, pp. 3-11
-
-
Weiser, M.1
-
2
-
-
0038588436
-
E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior
-
Tampa, Florida
-
S. Spiekermann, J. Grossklags, B. Berendt, "E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior, " Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, Florida, 2001.
-
(2001)
Proceedings of the 3rd ACM Conference on Electronic Commerce
-
-
Spiekermann, S.1
Grossklags, J.2
Berendt, B.3
-
3
-
-
84860422816
-
A bluetooth infrastructure for automatic services access in ubiquitous and nomadic computing environments
-
M. D'Arienzo, G. D'Angelo, M. Ficco, "A bluetooth infrastructure for automatic services access in ubiquitous and nomadic computing environments, " Proceedings of the 5th ACM international workshop on Mobility management and wireless access, MobiWac '07, pp. 17-24, 2007.
-
(2007)
Proceedings of the 5th ACM International Workshop on Mobility Management and Wireless Access, MobiWac '07
, pp. 17-24
-
-
D'Arienzo, M.1
D'Angelo, G.2
Ficco, M.3
-
4
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
L. Kagal, T. Finin, A. Joshi "Trust-based security in pervasive computing environments, " Computer, vol. 34, n.12, pp. 154-157, 2001.
-
(2001)
Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
6
-
-
0002283033
-
From data mining to knowledge discovery in databases
-
Menlo Park, CA
-
U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth, "From Data Mining to Knowledge Discovery in Databases." Advances in knowledge discovery and data mining, American Association for Artificial Intelligence, Menlo Park, CA, 1996.
-
(1996)
Advances in Knowledge Discovery and Data Mining, American Association for Artificial Intelligence
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
7
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
R. Agrawal, T. Imieliński, A. Swami, "Mining association rules between sets of items in large databases, " Proceedings of the 1993 ACM SIGMOD International Conference on Management of data-SIGMOD '93, vol. 22, n.2, pp. 207-216, 1993.
-
(1993)
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data-SIGMOD '93
, vol.22
, Issue.2
, pp. 207-216
-
-
Agrawal, R.1
Imieliński, T.2
Swami, A.3
-
8
-
-
0001882616
-
Fast algorithms for mining association rules
-
R. Agrawal and R. Srikant, "Fast Algorithms for Mining Association Rules, " Proceedings of the 20th International Conference on Very Large Data Bases, VLDB 94, pp. 487-499, 1994.
-
(1994)
Proceedings of the 20th International Conference on Very Large Data Bases, VLDB
, vol.94
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
9
-
-
84957069091
-
Naive (Bayes) at forty: The independence assumption in information retrieval
-
D. Lewis, "Naive (Bayes) at forty: The independence assumption in information retrieval, " Machine Learning: ECML-98 Lecture Notes in Computer Science, vol. 1398, pp. 4-15, 1998.
-
(1998)
Machine Learning: ECML-98 Lecture Notes in Computer Science
, vol.1398
, pp. 4-15
-
-
Lewis, D.1
-
11
-
-
33749617232
-
Trust, reputation and identity in the electronic markets
-
H. Zhang, "Trust, reputation and identity in the electronic markets, " Journal of Information Technology Theory and Application, JITTA, vol. 6, n.4, pp. 29-40, 2005.
-
(2005)
Journal of Information Technology Theory and Application, JITTA
, vol.6
, Issue.4
, pp. 29-40
-
-
Zhang, H.1
-
12
-
-
84881034863
-
Feeltrust: Providing trustworthy communications in ubiquitous mobile environment
-
G. Carullo, A. Castiglione, G. Cattaneo, A. De Santis, U. Fiore, F. Palmieri, "FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment, " Proceedings of the IEEE 27th International Conference on Advanced Information Networking and Applications, AINA, pp. 1113-1120, 2013.
-
(2013)
Proceedings of the IEEE 27th International Conference on Advanced Information Networking and Applications, AINA
, pp. 1113-1120
-
-
Carullo, G.1
Castiglione, A.2
Cattaneo, G.3
De Santis, A.4
Fiore, U.5
Palmieri, F.6
-
13
-
-
84942372929
-
A triadic closure and homophily-based recommendation system for online social networks
-
G. Carullo, A. Castiglione, A. De Santis, F. Palmieri, "A triadic closure and homophily-based recommendation system for online social networks, " Proceedings-Journal World Wide Web, pp. 23, 2015.
-
(2015)
Proceedings-Journal World Wide Web
, pp. 23
-
-
Carullo, G.1
Castiglione, A.2
De Santis, A.3
Palmieri, F.4
-
14
-
-
0242641140
-
The digitization of word-of-mouth: Promise and challenges of online reputation mechanisms
-
C. Dellarocas, "The digitization of word-of-mouth: Promise and challenges of online reputation mechanisms, " Management Science, vol. 49, n.10, pp. 1407-1424, 2003.
-
(2003)
Management Science
, vol.49
, Issue.10
, pp. 1407-1424
-
-
Dellarocas, C.1
-
15
-
-
3142662162
-
Web-based reputation management systems: Problems and suggested solutions
-
R.A. Malaga, "Web-Based Reputation Management Systems: Problems and Suggested Solutions, " Journal Electronic Commerce Research, vol. 1, n.4, pp. 403-417, 2001.
-
(2001)
Journal Electronic Commerce Research
, vol.1
, Issue.4
, pp. 403-417
-
-
Malaga, R.A.1
-
16
-
-
84944078503
-
A reputation-based trust model for peer-To-peer ecommerce communities
-
L. Xiong, L. Liu, "A reputation-based trust model for peer-To-peer ecommerce communities, " IEEE International Conference on ECommerce, pp. 275-284, 2003.
-
(2003)
IEEE International Conference on ECommerce
, pp. 275-284
-
-
Xiong, L.1
Liu, L.2
-
17
-
-
84964494064
-
Security attacks and solutions on ubiquitous computing networks
-
A. Sharifi, M. Khosravi, A. Shah, "Security Attacks and Solutions On Ubiquitous Computing Networks, " International Journal of Engineering and Innovative Technology (IJEIT), vol. 3, n.4, 2013.
-
(2013)
International Journal of Engineering and Innovative Technology (IJEIT
, vol.3
, Issue.4
-
-
Sharifi, A.1
Khosravi, M.2
Shah, A.3
-
18
-
-
38049001489
-
Modeling of man-in-The-middle attack in the wireless networks
-
Z. Chen, S. Guo, K. Zheng, Y. Yang, "Modeling of Man-in-The-Middle Attack in the Wireless Networks, " International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2007, pp. 2255-2258, 2007.
-
(2007)
International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2007
, pp. 2255-2258
-
-
Chen, Z.1
Guo, S.2
Zheng, K.3
Yang, Y.4
-
20
-
-
0003593599
-
-
RFC 2693, IETF
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, "SPKI Certificate Theory, " RFC 2693, IETF, 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
21
-
-
35248873087
-
Experience with the keynote trust management system: Applications and future directions
-
M. Blaze, J. Ioannidis, A. D. Keromytis, "Experience with the keynote trust management system: applications and future directions, " Proceedings of the 1st international conference on Trust management, pp. 284-300, 2003.
-
(2003)
Proceedings of the 1st International Conference on Trust Management
, pp. 284-300
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
-
22
-
-
78649394789
-
Weka-experiences with a Java open-source project
-
R. R. Bouckaert, E. Frank, M. A. Hall, G. Holmes, B. Pfahringer, P. Reutemann, I. H. Witten, "WEKA-Experiences with a Java Open-Source Project, " Journal of Machine Learning Research, vol.11, pp.2533-2541, 2010
-
(2010)
Journal of Machine Learning Research
, vol.11
, pp. 2533-2541
-
-
Bouckaert, R.R.1
Frank, E.2
Hall, M.A.3
Holmes, G.4
Pfahringer, B.5
Reutemann, P.6
Witten, I.H.7
|