Author of the publication

Trust and e-commerce: a study of consumer perceptions.

, , and . Electron. Commer. Res. Appl., 2 (3): 203-215 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint Propagation in a Cooperative Approach for Multimodal Presentation Planning., and . ECAI, page 256-260. John Wiley and Sons, Chichester, (1996)The Establishment and Analysis of the Risk Event Assessment System in Urban Traffic Environment., , , , , and . IEEE Access, (2018)Virtual machine allocation policies against co-resident attacks in cloud computing., , , and . ICC, page 786-792. IEEE, (2014)CSSSketch2Code: An Automatic Method to Generate Web Pages with CSS Style., , and . ICAAI, page 29-35. ACM, (2018)Using constraint propagation in MAGPIE: a multi-agent approach., and . Comput. Stand. Interfaces, 18 (6-7): 575-582 (1997)A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos., , , , , and . Sensors, 19 (24): 5366 (2019)Target positioning method in binocular vision manipulator control based on improved canny operator., , and . Multimedia Tools Appl., 79 (13-14): 9599-9614 (2020)QoE Oriented Adaptive Streaming Method for 360° Virtual Reality Videos., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1655-1659. IEEE, (2019)WiDetect: Robust Motion Detection with a Statistical Electromagnetic Model., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (3): 122:1-122:24 (2019)Graph Neural Networks with Continual Learning for Fake News Detection from Social Media., , and . CoRR, (2020)