Search Results

51 - 60 of 120 items :

  • Information Technology x
Clear All
Seeking Health Information Online: The Moderating Effects of Problematic Situations on User Intention

Information Science 41 2 228 241 Lemire, M., Paré, G., Sicotte, C., & Harvey, C. (2008). Determinants of Internet use as a preferred source of information on personal health. International Journal of Medical Informatics, 77(11), 723–734. 10.1016/j.ijmedinf.2008.03.002 Lemire M. Paré G. Sicotte C. Harvey C. 2008 Determinants of Internet use as a preferred source of information on personal health International Journal of Medical Informatics 77 11 723 734 Li, Y.L., & Hu, L.L. (2012). Information seeking and search based on context and situation (in

Open access
The Effects of B2C Interaction on Customer Loyalty

.561 (CL) CL2 0.722 15.925 p<0.001. CL3 0.627 13.428 p<0.001. CL4 0.779 25.175 p<0.001. CL5 0.810 32.035 p<0.001. 4.2 Instrument Construction Eight constructs are measured in this research, including efficiency (EF), security (SE), fulfillment (FU), mobility (MO), community (CO), cultivation (CUL), customization (CUS) and customer loyalty (CL). All constructs are adapted from previous researchers and modified according to B2C context. Each construct consists of at least three items

Open access
SeaGlass: Enabling City-Wide IMSI-Catcher Detection

://www.openmobilenetwork.org/ . Accessed: 2017-03-14. [25] Qrc surveyor 500. http://www.qrctech.com/Surveyor500-p/q3850.htm . Accessed: 2017-03-14. [26] T. Rappaport. Wireless Communications: Principles and Practice . Prentice Hall PTR, Upper Saddle River, NJ, USA, 2nd edition, 2001. [27] J. Scahill and M. Williams. Stingrays a secret catalogue of government gear for spying on your cellphone. https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/ , December 2015. Accessed: 2017-03-14. [28] Skyhook wireless. http

Open access
Image-based BRDF Representation

REFERENCES A shikhmin , M. and S hirley , P. 2000. An anisotropic phong brdf model. J. Graph. Tools 5, 2 (Feb.), 25–32. C ook , R. L. and T orrance , K. E. 1982. A reflectance model for computer graphics. ACM Trans. Graph. 1, 1, 7–24. Ď urikovič , R., K olchin , K., and E rshov , S. 2002. Rendering of japanese artcraft. In Short Presentations of EUROGRAPHICS Conference . Braunschweig, Germany, 131–138. M atusik , W., P fister , H., B rand , M., and M c M illan , L. 2003. A data-driven reflectance model. In SIGGRAPH ’03: ACM

Open access
Metallic paint appearance measurement and rendering

, Eds. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol. 4663. 370-378. TORRANCE, K. E. AND SPARROW, E. M. 1967. Theory for off-specular reflection from roughened surfaces. JOSA 57, 9, 1105-1114. ĎURIKOVIČ, R. AND MARTENS, W. L. 2003. Simulation of sparkling and depth effect in paints. In SCCG ’03: Proceedings of the 19th spring conference on Computer graphics. ACM, New York, NY, USA, 193-198. WARD, G. J. 1992. Measuring and modeling anisotropic reflection. SIGGRAPH Comput. Graph. 26, 2

Open access
Enhancing Conflict Resolution Mechanism for Automatic Model Composition

–100, Elsevier Science, July 2002. http://dx.doi.org/10.1016/S0167-6423(02)00030-8 [24] R. Douence, P. Fradet, and M. Sudholt, “Composition, reuse and interaction analysis of stateful aspects,” in K. Lieberherr (ed.), Proc. 3rd Int. Conf. on Aspect-Oriented Software Development, AOSD ‘2004, pp. 141–150, ACM Press, Mar. 2004. http://dx.doi.org/10.1145/976270.976288 [25] The Object Management Group (OMG). Unified Modeling Language . OMG, Available: http://www.omg.org/docs/formal/03-03-01.pdf . Version 1.5, March 2003. [26] UML Syntax and Semantics Guide V

Open access
Location Privacy with Randomness Consistency

, all anonymous. http:// www.nytimes.com/2014/03/19/technology/new-social-apphas-juicy-posts-but-no-names.html?_r=0, 2014. [13] G. Ananthanarayanan, V. N. Padmanabhan, L. Ravindranath, and C. A. Thekkath. Combine: leveraging the power of wireless peers through collaborative downloading. In Proceedings of the 5th international conference on Mobile systems, applications and services, pages 286-298. ACM, 2007. [14] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for

Open access
Portrait of a Privacy Invasion
Detecting Relationships Through Large-scale Photo Analysis

://fbcdn-dragon-a.akamaihd.net/hphotos-akash3/ 851590_229753833859617_1129962605_n.pdf. [11] GigaOM. Instagram reports 200M users. http://gigaom.com/2014/03/25/instagramreports-200m-users-20b-photos-shared/. [12] P. Gundecha, G. Barbier, and H. Liu. Exploiting vulnerability to secure user privacy on a social networking site. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 511-519. ACM, 2011. [13] T. Independent. How average Briton is caught on camera 300 times a day. http

Open access
Transportation Mode Choice Analysis Based on Classification Methods

. Quinlain J. R. Improved Use of Continuous Attributes in C4.5. Journal of Artificial Intelligence Research 4. 1996. p. 77-90. Meyer M. D., Miller E. J. Urban Transportation Planning. A Decision-Oriented Approach. Second Edition. Mc-Graw Hill, 2001. Chi Xie, Jinyang Lu, Parkany E. Work Travel Mode Choice Modeling Using Data Mining: Decision Trees and Neural Networks. Transportation Research Record, Paper No. 03-4348, 2003. Karlaftis M. G. Predicting Mode Choice through Multivariate

Open access
PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer

. Laurie. Drac: An architecture for anonymous low-volume communications. In PETS, 2010. [24] G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a type III anonymous remailer protocol. In IEEE S&P, 2003. [25] G. Danezis and I. Goldberg. Sphinx: A compact and provably secure mix format. In IEEE S&P, 2009. [26] S. DiBenedetto, P. Gasti, G. Tsudik, and E. Uzun. ANDaNA: Anonymous named data networking application. arXiv preprint arXiv:1112.2205, 2011. [27] R. Dingledine, N. Mathewson, and P

Open access