Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,317,613 papers from all fields of science
Search
Sign In
Create Free Account
E-services
Known as:
E-service
The concept of e-service (short for electronic service) represents one prominent application of utilizing the use of information and communication…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Customer knowledge
Enterprise application integration
Internet privacy
SERVQUAL
Expand
Broader (1)
E-commerce
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
Adaptive information-sharing for privacy-aware mobile social networks
Igor Bilogrevic
,
Kévin Huguenin
,
Berker Agir
,
Murtuza Jadliwala
,
J. Hubaux
Ubiquitous Computing
2013
Corpus ID: 1807114
Personal and contextual information are increasingly shared via mobile social networks. Users' locations, activities and their co…
Expand
Highly Cited
2011
Highly Cited
2011
Representing scientific data sets in KML: Methods and challenges
L. Ballagh
,
B. Raup
,
+4 authors
Amruta Gupte
Computational Geosciences
2011
Corpus ID: 3077832
Highly Cited
2010
Highly Cited
2010
Privacy-preserving similarity-based text retrieval
HweeHwa Pang
,
Jialie Shen
,
R. Krishnan
TOIT
2010
Corpus ID: 16482867
Users of online services are increasingly wary that their activities could disclose confidential information on their business or…
Expand
Highly Cited
2008
Highly Cited
2008
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks
T. Weigold
,
T. Kramp
,
R. Hermann
,
Frank Höring
,
P. Buhler
,
M. Baentsch
Trust and Trustworthy Computing
2008
Corpus ID: 39290220
This paper introduces the Zurich Trusted Information Channel (ZTIC, for short), a cost-efficient and easy-to-use approach to…
Expand
Highly Cited
2005
Highly Cited
2005
iBotGuard: an Internet-based Intelligent Robot security system using Invariant Face Recognition against intruder
J. Liu
,
M. Wang
,
B. Feng
IEEE Transactions on Systems Man and Cybernetics…
2005
Corpus ID: 3758775
One crucial application of intelligent robotic systems is remote surveillance using a security robot. A fundamental need in…
Expand
Highly Cited
2004
Highly Cited
2004
An intelligent recommender system using sequential Web access patterns
Baoyao Zhou
,
S. Hui
,
Kuiyu Chang
International Conference on Computational…
2004
Corpus ID: 15456241
To provide intelligent personalized online services such as Web recommendations, it is usually necessary to model users' Web…
Expand
Review
2002
Review
2002
A decade of digital reference 1991-2001
C. Tenopir
,
Lisa A. Ennis
2002
Corpus ID: 60935000
Four surveys conducted over a decade provide insights about changes that have occurred in academic library reference services due…
Expand
2002
2002
Runtime Service Composition via Logic-Based Program Synthesis
S. Lämmermann
2002
Corpus ID: 60385402
Dynamic composition of services from components at runtime can help to provide flexible service infrastructures, but requires…
Expand
Highly Cited
2001
Highly Cited
2001
Trustlet, Open Research on Trust Metrics
P. Massa
,
Kasper Souren
,
Martino Salvetti
,
Danilo Tomasoni
Business Information Systems
2001
Corpus ID: 14205024
A trust metric is a technique for predicting how much a user of a social network might trust another user. This is especially…
Expand
Highly Cited
1979
Highly Cited
1979
The Marketing of Professional Services — An Organizational Dilemma
E. Gummesson
1979
Corpus ID: 167511464
Investigates the role of the professional in a firm offering professional services aiming to answer the questions of: what…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE