Sciweavers

1625 search results - page 131 / 325
» Intentionality
Sort
View
HICSS
2003
IEEE
221views Biometrics» more  HICSS 2003»
14 years 3 months ago
"Applying TAM to E-Services Adoption: The Moderating Role of Perceived Risk"
Consumer adoption of e-services is an important goal for many service providers, however little is known about how different consumer segments perceive and evaluate them for adopt...
Mauricio Featherman, Mark A. Fuller
IWPC
2003
IEEE
14 years 3 months ago
Are Decomposition Slices Clones?
When computing program slices on all variables in a system, we observed that many of these slices are the same. This leads to the question: Are we looking at software clones? We d...
Keith Gallagher, Lucas Layman
IWPC
2003
IEEE
14 years 3 months ago
Towards a Clone Detection Benchmark Suite and Results Archive
Source code clones are copies or near-copies of other portions of code, often created by copying and pasting portions of source code. This working session is concerned with buildi...
Arun Lakhotia, Junwei Li, Andrew Walenstein, Yun Y...
GROUP
2003
ACM
14 years 3 months ago
Using the transformational approach to build a safe and generic data synchronizer
Reconciliating divergent data is an important issue in concurrent engineering, mobile computing and software configuration management. Currently, a lot of synchronizers or merge ...
Pascal Molli, Gérald Oster, Hala Skaf-Molli...
AGENTCL
2003
Springer
14 years 3 months ago
Proactive Communications in Agent Teamwork
Abstract. The capabilities for agents in a team to anticipate informationneeds of teammates and proactively offer relevant information are highly desirable. However, such behavior...
John Yen, Xiaocong Fan, Richard A. Volz