A survey of revenue sharing social software's systems
In this paper we survey 21 different revenue sharing social software based websites and analyze the approaches that these websites have taken in sharing its revenue. We investigate the revenue sharing algorithms if they are disclosed as well as outline the anti-fraud mechanism implemented by these w...
| Main Authors: | Chai, Kevin, Potdar, Vidyasagar, Chang, Elizabeth |
|---|---|
| Other Authors: | Mark Rouncefield |
| Format: | Conference Paper |
| Published: |
Melbourne University
2007
|
| Online Access: | http://hdl.handle.net/20.500.11937/32817 |
Similar Items
Open Source and Closed Source Software Development Methodologies
by: Potdar, Vidyasagar, et al.
Published: (2004)
by: Potdar, Vidyasagar, et al.
Published: (2004)
A survey of Western Australian Software Businesses an exlporative web content analysis
by: Sambhanthan, A., et al.
Published: (2016)
by: Sambhanthan, A., et al.
Published: (2016)
A survey of digital image watermarking techniques
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Wireless multimedia sensor networks: a survey
by: Potdar, Vidyasagar, et al.
Published: (2009)
by: Potdar, Vidyasagar, et al.
Published: (2009)
Wireless multimedia sensor network technology: a survey
by: Sharif, Atif, et al.
Published: (2009)
by: Sharif, Atif, et al.
Published: (2009)
User contribution measurement model for web-based discussion forums
by: Chai, Kevin, et al.
Published: (2009)
by: Chai, Kevin, et al.
Published: (2009)
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Content quality assessment related frameworks for social media
by: Chai, Kevin, et al.
Published: (2009)
by: Chai, Kevin, et al.
Published: (2009)
Towards Social Network based Approach for Software Engineering Ontology Sharing and Evolution
by: Wongthongtham, Pornpit, et al.
Published: (2007)
by: Wongthongtham, Pornpit, et al.
Published: (2007)
Business sustainability frameworks a survey
by: Sambhanthan, A., et al.
Published: (2016)
by: Sambhanthan, A., et al.
Published: (2016)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
A quantization based robust image watermarking algorithm in the wavelet domain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Improving RFID read rate reliability by a systemic error detection approach
by: Potdar, Vidyasagar, et al.
Published: (2007)
by: Potdar, Vidyasagar, et al.
Published: (2007)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006)
by: Potdar, M., et al.
Published: (2006)
Waste management strategies for Software Development companies: An explorative text analysis of business sustainability reports
by: Sambhanthan, A., et al.
Published: (2016)
by: Sambhanthan, A., et al.
Published: (2016)
Green Business Practices for Software Development Companies: An Explorative Text Analysis of Business Sustainability Reports
by: Sambhanthan, A., et al.
Published: (2015)
by: Sambhanthan, A., et al.
Published: (2015)
A survey of awareness, knowledge and perception of online spam
by: Ridzuan, F., et al.
Published: (2012)
by: Ridzuan, F., et al.
Published: (2012)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
A practical image retrieval framework for tourism industry
by: Zhao, Shuxin, et al.
Published: (2007)
by: Zhao, Shuxin, et al.
Published: (2007)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
Social games and game-based revenue models
by: Balnaves, Mark, et al.
Published: (2016)
by: Balnaves, Mark, et al.
Published: (2016)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
A review of opinion mining and sentiment classification framework in social networks
by: Lo, Yee, et al.
Published: (2009)
by: Lo, Yee, et al.
Published: (2009)
Applications of wireless sensor networks in pharmaceutical industry
by: Potdar, M., et al.
Published: (2009)
by: Potdar, M., et al.
Published: (2009)
Probabilistic assessment of loss in revenue generation in demand-driven production
by: Hussain, Omar, et al.
Published: (2011)
by: Hussain, Omar, et al.
Published: (2011)
Automated Data Capture Technologies: RFID
by: Potdar, Vidyasagar, et al.
Published: (2007)
by: Potdar, Vidyasagar, et al.
Published: (2007)
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Towards style-oriented SOA design
by: Wu, Chen, et al.
Published: (2005)
by: Wu, Chen, et al.
Published: (2005)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
Multiple image watermarking using the SILE approach
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Latent semantic analysis - The dynamics of semantics web services discovery
by: Wu, Chen, et al.
Published: (2008)
by: Wu, Chen, et al.
Published: (2008)
Optimal Ordering Decisions and Revenue Sharing in a Single Period Split Order Supply Chain
by: Kalpana, P., et al.
Published: (2011)
by: Kalpana, P., et al.
Published: (2011)
Identifying prosumer’s energy sharing behaviours for forming optimal prosumer-communities
by: Rathnayaka, Dinusha, et al.
Published: (2011)
by: Rathnayaka, Dinusha, et al.
Published: (2011)
e-Forensics steganography systems for secret information retrieval
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Web of things as a framework for ubiquitous intelligence and computing
by: Dillon, Tharam S., et al.
Published: (2009)
by: Dillon, Tharam S., et al.
Published: (2009)
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
Similar Items
-
Open Source and Closed Source Software Development Methodologies
by: Potdar, Vidyasagar, et al.
Published: (2004) -
A survey of Western Australian Software Businesses an exlporative web content analysis
by: Sambhanthan, A., et al.
Published: (2016) -
A survey of digital image watermarking techniques
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Wireless multimedia sensor networks: a survey
by: Potdar, Vidyasagar, et al.
Published: (2009) -
Wireless multimedia sensor network technology: a survey
by: Sharif, Atif, et al.
Published: (2009)