Sciweavers

744 search results - page 83 / 149
» Studying Knowledge Management System Success in System Admin...
Sort
View
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
14 years 1 months ago
Does the Extended Technology Acceptance Model Apply to Physicians
In previous studies, the technology acceptance model (TAM) [1] has been widely used by information technology researchers to gain a better understanding of information technology ...
William G. Chismar, Sonja Wiley-Patton
IH
2005
Springer
14 years 1 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
14 years 2 months ago
Cues to Deception in Online Chinese Groups
Advancing our knowledge about cues to deception is crucial to successful deception detection. A lengthy list of cues to deception has been identified via a myriad of deception stu...
Lina Zhou, Yu-wei Sung
GLOBECOM
2006
IEEE
14 years 1 months ago
Analysis of Peer-to-Peer SIP in a Distributed Mobile Middleware System
The seamless and flexible interconnection of the existing and emerging protocols and networks is essential to the success of the new generation mobile applications and services. Fo...
Erkki Harjula, Jussi Ala-Kurikka, Douglas Howie, M...
NAACL
1994
13 years 9 months ago
Predicting and Managing Spoken Disfluencies During Human-Computer Interaction
This research characterizes the spontaneous spoken disfluencies typical of human-computer interaction, and presents a predictive model accounting for their occurrence. Data were c...
Sharon L. Oviatt