• Nenhum resultado encontrado

[PDF] Top 20 User Types in Online Applications

Top PDF User Types in Online Applications were compiled by 1Library PT

User Types in Online Applications

User Types in Online Applications

... of user has a high access level with the task of validating the changes, additions or removal operations initiated by other users; the user role is necessary in the context in which the ... See full document

22

Semantic Web Approach towards E-Commerce

Semantic Web Approach towards E-Commerce

... through online shopping for a better price. Hence search plays a vital role in the present ...the user. For example, if a user wishes to retrieve data about “Nissan cars costing between 3 to 5 ... See full document

6

JxAppDev framework for hybrid applications

JxAppDev framework for hybrid applications

... stability in the ...platform, in order to target as much users as ...Native applications as well as mobile ...evolving, in some cases it is difficult to create software for all existing ... See full document

93

SLA for E-Learning System Based on Cloud Computing

SLA for E-Learning System Based on Cloud Computing

... and online services that based on the ‘pay-as-you-use’ ...the user, is needed for many types of current applications as the E-Learning ...work in this paper presents an idea of ... See full document

6

A User-Centered and Autonomic Multi-Cloud Architecture for High Performance Computing Applications

A User-Centered and Autonomic Multi-Cloud Architecture for High Performance Computing Applications

... guarantees. In this context, the users have to benchmark their applications on multiple resources, considering various optimization ...driver in the instance’s operating system; (b) stop the virtual ... See full document

282

Characterizing user navigation and interactions in online social networks

Characterizing user navigation and interactions in online social networks

... common user behavior across all categories of ...four types: (i) browsing of media content such as photos and videos, (ii) profile content (both one’s own and others’), (iii) text messages of testimonials, ... See full document

24

Uloof user-level online offloading framework: user-level online offloading framework

Uloof user-level online offloading framework: user-level online offloading framework

... on applications that are used for business, entertainment and research areas has been pushing forward the development of the mobile ...of applications. In this scenario, code is op- timally executed ... See full document

120

USER-CENTRIC PERSONALIZED MULTIFACET MODEL TRUST IN ONLINE SOCIAL NETWORK

USER-CENTRIC PERSONALIZED MULTIFACET MODEL TRUST IN ONLINE SOCIAL NETWORK

... OSN. In order to design usable technologies, it must be designed with a secure applications and interface so that end-users would be able to comprehend the functions provides for them ...application ... See full document

15

A Formal Classification of Internet Banking Attacks and Vulnerabilities

A Formal Classification of Internet Banking Attacks and Vulnerabilities

... for online banking systems currently in use are strongly based on Internet banking user identification and authentication methods, which are also the components where most Internet banking systems' ... See full document

12

No More Keyword Search or FAQ: Innovative Ontology and Agent Based Dynamic User Interface

No More Keyword Search or FAQ: Innovative Ontology and Agent Based Dynamic User Interface

... problem types and their symptoms and to support the dynamic interface on which users can choose to describe and identify the ...knowledge in terms of ...users in company A can make use of Oracle and ... See full document

6

A new look at online attraction: unilateral initial attraction and the pivotal role of perceived similarity

A new look at online attraction: unilateral initial attraction and the pivotal role of perceived similarity

... 2016). In both cases, individuals have readily available objective information that can be used to form judgments about the other person ...for in a partner), which will influence interpersonal ... See full document

38

The public production and sharing of medical information. An Australian perspective

The public production and sharing of medical information. An Australian perspective

... products in Australia, there has also been the creation of consumer peer tutoring ...issues in general, and there are similar activities in other ...32-35 In Australia there are a few reasons ... See full document

10

An Application Framework for a Situation-aware System Support for Smart Spaces

An Application Framework for a Situation-aware System Support for Smart Spaces

... effort, in recent years we have been witnessing a growing perception about a persistent gap between the promises of the area and its real ...events in the field, such as UbiSys06 and CMPPC07, was that most ... See full document

5

Understanding churn and its reasons: The GuestU case

Understanding churn and its reasons: The GuestU case

... mobile applications developers for tracking downloads and ...109 applications since the beginning of 2015 until end of ...GuestU applications were not yet implemented with App Annie’s SDK and their ... See full document

34

Uso da Internet entre os alunos do primeiro ano da Universidade: Computador contra atividades de telemóveis em contextos casa, escola e comunidade

Uso da Internet entre os alunos do primeiro ano da Universidade: Computador contra atividades de telemóveis em contextos casa, escola e comunidade

... “fluency in multiple media, valuing each for the types of communication, activities, experiences, and expressions it empowers; learning based on collectively seeking, sieving, and synthesizing experiences ... See full document

8

CURRENT TRENDS IN THE USE OF SOLAR ENERGY

CURRENT TRENDS IN THE USE OF SOLAR ENERGY

... Thin-film silicon solar cells have the following important advantages compared to crystalline cells: the thickness of silicon can be drastically reduced to 50 μm; thin films can be deposited on low-cost substrates; and ... See full document

8

Solving Problems in Software Applications through Data Synchronization in Case of Absence of the Network

Solving Problems in Software Applications through Data Synchronization in Case of Absence of the Network

... other in sense of modeling in a real world are treated as a single complex object, thus the conflicts could be detected and if the data in different tables are ...used in the time of ... See full document

7

Extracting gene networks for low-dose radiation using graph theoretical algorithms.

Extracting gene networks for low-dose radiation using graph theoretical algorithms.

... modified in this way becomes highly immunogenic, activating the production of antibodies direc- ted against it ...role in sperm motility [40]. However it is also relatively highly expressed in spleen ... See full document

12

Assistive locomotion strategies for active lower limb devices

Assistive locomotion strategies for active lower limb devices

... (presented in Figure ...focused in assistance of children suffering from quadriplegia, providing active motion for the hip and knee flexion/extension and ankle flexion/extension under-actuated by connecting ... See full document

183

A Digital Diary: Remembering the Past Using the Present Context

A Digital Diary: Remembering the Past Using the Present Context

... the user by using their 2 dimensional ...the user can recognize the real world objects with the help of images already ...the user were not recognized by the user. In near future, we ... See full document

12

Show all 10000 documents...