Sciweavers

595 search results - page 95 / 119
» Situations in Conceptual Modeling of Context
Sort
View
MOBILITY
2009
ACM
14 years 3 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
IJCAI
2007
14 years 11 days ago
A Game-Theoretic Analysis of Strictly Competitive Multiagent Scenarios
This paper is a comparative study of game-theoretic solution concepts in strictly competitive multiagent scenarios, as commonly encountered in the context of parlor games, competi...
Felix Brandt, Felix A. Fischer, Paul Harrenstein, ...
EOR
2007
93views more  EOR 2007»
13 years 11 months ago
Contour line construction for a new rectangular facility in an existing layout with rectangular departments
In a recent paper, Savas, Batta and Nagi [14] consider the optimal placement of a finite-sized facility in the presence of arbitrarily-shaped barriers under rectilinear travel. T...
Hari Kelachankuttu, Rajan Batta, Rakesh Nagi
EJIS
2007
139views more  EJIS 2007»
13 years 11 months ago
Applying TAM across cultures: the need for caution
The technology acceptance model (TAM) is one of the most widely used behavioural models in the information systems (IS) field. Researchers have used the model to study many differ...
Scott McCoy, Dennis F. Galletta, William R. King
WSC
1996
14 years 7 days ago
Modeling of Chain Conveyors and Their Equipment Interfaces
Chain conveyors are a specific type of conveyor often used in a variety of manufacturing and production applications, such as body and paint shops. These conveyors must typically ...
Ali K. Gunal, Edward J. Williams, Shigeru Sadakane