In this research we investigate that user's stickiness of virtual community would affect the trust and the stickiness is mediator between trust repair and *** questionnaire through"Happy Farm"from the Fa...
详细信息
In this research we investigate that user's stickiness of virtual community would affect the trust and the stickiness is mediator between trust repair and *** questionnaire through"Happy Farm"from the Facebook,we used the Structural equation modeling(SEM) to analyze the data,in order to understand repair methods and the community trust the persons concerned after the stickiness of the impact of *** result shows that functional and informational of trust repair has positive relationship with stickiness.
This paper proposes an automatic model-based approach that enables adaptive decision making in modern virtual games. It builds upon the Integrated MDP and POMDP Learning AgeNT (IMPLANT) architecture (Tan and Cheng 200...
详细信息
In symbiotic computing approach, digital world and humans interact with each other, based on "basic principle of symbiosis", where they increase information processing ability, activity, and stability by off...
详细信息
The World Wide Web is nearing omnipresence. The explosively growing number of Web contents including Digitalized manuals, emails pictures, multimedia, and Web services require a distinct and elaborate structural frame...
详细信息
Multi-issue negotiation protocols represent a promising field since most negotiation problems in the real world involve multiple issues. Our work focuses on negotiation with multiple interdependent issues in which age...
详细信息
Agile practices have grappled their importance for development of softwares in *** methods demand active communication with customers and team members to achieve the highest customer *** communication is the need for ...
详细信息
Agile practices have grappled their importance for development of softwares in *** methods demand active communication with customers and team members to achieve the highest customer *** communication is the need for building trust and discipline among the team members and *** has been observed in literature that active communication in communication hierarchy plays a vital role in improving design and quality of *** reduces the project development time and cost of change of *** have conducted a survey and analyzed the data based upon modes of *** investigation reveals that active communication may be important during primary and end level of agile communication iterative cycle whereas passive communication is highly useful at the mid-level of *** importance of communication modes at various phases of software development has also been discussed in this paper.
Product design is an important process in industry whereas it has been usually performed based on aesthetics and static strength rather than on dynamical features of the product in use, or more specifically, in graspi...
详细信息
Agile practices have grappled their importance for development of softwares in industries. Agile methods demand active communication with customers and team members to achieve the highest customer satisfaction. Effect...
详细信息
Agile practices have grappled their importance for development of softwares in industries. Agile methods demand active communication with customers and team members to achieve the highest customer satisfaction. Effective communication is the need for building trust and discipline among the team members and customers. It has been observed in literature that active communication in communication hierarchy plays a vital role in improving design and quality of software. It reduces the project development time and cost of change of software. We have conducted a survey and analyzed the data based upon modes of communication. The investigation reveals that active communication may be important during primary and end level of agile communication iterative cycle whereas passive communication is highly useful at the mid-level of cycle. The importance of communication modes at various phases of software development has also been discussed in this paper.
In symbiotic computing approach, digital world and humans interact with each other, based on ``basic principle of symbiosis'', where they increase information processing ability, activity, and stability by off...
详细信息
In symbiotic computing approach, digital world and humans interact with each other, based on ``basic principle of symbiosis'', where they increase information processing ability, activity, and stability by offering informations and support each other. We try to build a cognitive agent that implements a dynamic ontology which aims at representing what user knows about the operating field. We want our ontology to represent user's knowledge which change perpetually in function of user's experiences. Therefore, our ontology must do so, it is why it is called dynamic. This cognitive agent tries to improve the relationship between humans and computers by representing user's knowledge which allows to perform personalised services. So in this paper, we design mechanisms which update user's knowledge by communication with him. The cognitive agent will be set in a strategy game called Ogame for testing purpose.
Notice of Violation of IEEE Publication Principles "A Study on Secure Multiparty Computation Problems and Their Relevance" by Shaikh, Z., Mishra, D.K published in the 2010 Second International Conference on ...
Notice of Violation of IEEE Publication Principles "A Study on Secure Multiparty Computation Problems and Their Relevance" by Shaikh, Z., Mishra, D.K published in the 2010 Second International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2010, pp.95-99 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee this paper has been found to be in violation of IEEE's Publication Principles. The committee has found Z. Shaikh to be the sole offending author and that D.K. Mishra was not involved in the offense. This paper contains significant portions of original text from the paper cited below. The original text was copied with insufficient attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: "Secure multi-party computation problems and their applications: a review and open problems" by Wenliang Du and Mikhail J. Atallah published in the Proceedings of the 2001 workshop on New security paradigms (NSPW '01), 2001, pp. 13 - 23 The growth of the Internet has prompted tremendous opportunities for cooperative computation, where people are jointly conducting computation tasks based on the private inputs they each supplies. These computations can occur between mutually untrusted parties, or even between competitors. For example, customers might send to a remote database queries that contain private information, two competing financial organizations might jointly invest in a project that must satisfy both organizations private and valuable constraints, and so on. Today, to conduct such computations, one entity must usually know the inputs from all the participants, however if nobody can be trusted enough to know all the inputs, privacy will become a pr
暂无评论