Sciweavers

2162 search results - page 41 / 433
» E-Crime Investigative Technologies
Sort
View
HICSS
1999
IEEE
183views Biometrics» more  HICSS 1999»
14 years 29 days ago
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution toward understanding IS usage and IS acceptance behaviors [6, 19]. However, as noted by seve...
Yogesh Malhotra, Dennis F. Galletta
PERCOM
2006
ACM
13 years 8 months ago
Incorporating Wireless Technology into Virtual Organizations Supporting the Work of Healthcare Teams
This study investigates how a virtual organization can be built in a distributed computing environment which includes wireless technology to support the work of a multi-disciplina...
Mohyuddin, W. A. Gray, David Morrey, Wendy Jones
ISCA
2009
IEEE
239views Hardware» more  ISCA 2009»
14 years 3 months ago
Scalable high performance main memory system using phase-change memory technology
The memory subsystem accounts for a significant cost and power budget of a computer system. Current DRAM-based main memory systems are starting to hit the power and cost limit. A...
Moinuddin K. Qureshi, Vijayalakshmi Srinivasan, Ju...
IPPS
2007
IEEE
14 years 3 months ago
RNAVLab: A unified environment for computational RNA structure analysis based on grid computing technology
Ribonucleic acid (RNA) molecules play important roles in many biological processes including gene expression and regulation. An RNA molecule is a linear polymer which folds back o...
Michela Taufer, Ming-Ying Leung, Kyle L. Johnson, ...
ICIS
2003
13 years 10 months ago
The Impact of Information Technology Spending on Future Performance
In this study, we investigate the association between information technology (IT) spending and future firm performance. Critics contend that greater expenditures on IT rarely lead...
Mark C. Anderson, Rajiv D. Banker, Nan Hu