Sciweavers

738 search results - page 134 / 148
» Behavioral Systems Theory: A Survey
Sort
View
HICSS
1999
IEEE
183views Biometrics» more  HICSS 1999»
14 years 27 days ago
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution toward understanding IS usage and IS acceptance behaviors [6, 19]. However, as noted by seve...
Yogesh Malhotra, Dennis F. Galletta
ATAL
2010
Springer
13 years 9 months ago
Modeling recursive reasoning by humans using empirically informed interactive POMDPs
Recursive reasoning of the form what do I think that you think that I think (and so on) arises often while acting rationally in multiagent settings. Several multiagent decision-ma...
Prashant Doshi, Xia Qu, Adam Goodie, Diana Young
ICISS
2007
Springer
14 years 2 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
CORR
2009
Springer
242views Education» more  CORR 2009»
13 years 6 months ago
Adaptive Scheduling of Data Paths using Uppaal Tiga
Abstract. We apply Uppaal Tiga to automatically compute adaptive scheduling strategies for an industrial case study dealing with a state-of-the-art image processing pipeline of a p...
Israa AlAttili, Fred Houben, Georgeta Igna, Steffe...
HYBRID
2010
Springer
13 years 10 months ago
Receding horizon control for temporal logic specifications
In this paper, we describe a receding horizon scheme that satisfies a class of linear temporal logic specifications sufficient to describe a wide range of properties including saf...
Tichakorn Wongpiromsarn, Ufuk Topcu, Richard M. Mu...