Sciweavers

892 search results - page 163 / 179
» Action respecting embedding
Sort
View
HICSS
1999
IEEE
183views Biometrics» more  HICSS 1999»
14 years 24 days ago
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution toward understanding IS usage and IS acceptance behaviors [6, 19]. However, as noted by seve...
Yogesh Malhotra, Dennis F. Galletta
SIGUCCS
1999
ACM
14 years 24 days ago
Bridging Worlds: The IT Support Professional as Interpreter Between Cultures
One result of the action of Moore’s Law, the doubling of IT (Information Technology) power every 18 months, is a widening gap in the understanding of this technology between tho...
Don Rea
CHI
1996
ACM
14 years 19 days ago
Technomethodology: Paradoxes and Possibilities
The design of CSCW systems has often had its roots in ethnomethodological understandings of work and investigations of working settings. Increasingly, we are also seeing these ide...
Graham Button, Paul Dourish
ASIACRYPT
2006
Springer
14 years 7 days ago
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Abstract. Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fa...
Souradyuti Paul, Bart Preneel
WSC
2007
13 years 10 months ago
New greedy myopic and existing asymptotic sequential selection procedures: preliminary empirical results
Statistical selection procedures can identify the best of a finite set of alternatives, where “best” is defined in terms of the unknown expected value of each alternative’...
Stephen E. Chick, Jürgen Branke, Christian Sc...