Agent-based electronic commerce is known to offer many advantages to users. However, very few studies have been devoted to deal with privacy issues in this domain. Privacy is of great concern and preserving users' privacy plays a crucial role to promote their trust in agent-based technologies. In this paper, we focus on preference profiling, which is a well-known threat to users' privacy. Specifically, we review strategies for customers' agents to prevent seller agents from obtaining accurate preference profiles of the former group by using data mining techniques. We experimentally show the efficacy of each of these strategies and discuss their suitability in different situations. Our experimental results show that customers can improve the...
[EN] Virtual learning environments are growing in importance as fast as e-learning is becoming highl...
[EN] We report on the development of an interface to the US Patent and Trademark Office (USPTO) that...
[EN] Cybersecurity is known as the practice of protecting systems from digital attacks. Organization...
The final publication is available at Springer via http://dx.doi.org/[insert DOIAdaptation in multia...
Structural relations established among agents influence the performance of decentralized service dis...
The final publication is available at Springer via http://dx.doi.org/10.1007/s11023-012-9299-6Animal...
The final publication is available at Springer via http://dx.doi.org/ 10.1007/s10462-016-9505-7.The...
[EN] This paper presents the extension of a meta-model (MAM5) and a framework based on the model (Ja...
[EN] Success in all sorts of situations is the most classical interpretation of general intelligence...
[EN] Due to the increase in collaborative work and the decentralization of processes in many domain...
[EN] Augmented Reality (AR) has become a mainstream technology in the development of solutions for r...
The final publication is available at Springer via http://dx.doi.org/10.1007/s10458-014-9257-1This ...
The final publication is available at Springer via http://dx.doi.org/DOI 10.1007/s10618-014-0378-6. ...
In this paper we consider the broader issue of gaining assurance that an agent system will behave ap...
In this paper we consider the broader issue of gaining assurance that an agent system will behave ap...
[EN] Virtual learning environments are growing in importance as fast as e-learning is becoming highl...
[EN] We report on the development of an interface to the US Patent and Trademark Office (USPTO) that...
[EN] Cybersecurity is known as the practice of protecting systems from digital attacks. Organization...
The final publication is available at Springer via http://dx.doi.org/[insert DOIAdaptation in multia...
Structural relations established among agents influence the performance of decentralized service dis...
The final publication is available at Springer via http://dx.doi.org/10.1007/s11023-012-9299-6Animal...
The final publication is available at Springer via http://dx.doi.org/ 10.1007/s10462-016-9505-7.The...
[EN] This paper presents the extension of a meta-model (MAM5) and a framework based on the model (Ja...
[EN] Success in all sorts of situations is the most classical interpretation of general intelligence...
[EN] Due to the increase in collaborative work and the decentralization of processes in many domain...
[EN] Augmented Reality (AR) has become a mainstream technology in the development of solutions for r...
The final publication is available at Springer via http://dx.doi.org/10.1007/s10458-014-9257-1This ...
The final publication is available at Springer via http://dx.doi.org/DOI 10.1007/s10618-014-0378-6. ...
In this paper we consider the broader issue of gaining assurance that an agent system will behave ap...
In this paper we consider the broader issue of gaining assurance that an agent system will behave ap...
[EN] Virtual learning environments are growing in importance as fast as e-learning is becoming highl...
[EN] We report on the development of an interface to the US Patent and Trademark Office (USPTO) that...
[EN] Cybersecurity is known as the practice of protecting systems from digital attacks. Organization...