Sciweavers

672 search results - page 131 / 135
» Words and forbidden factors
Sort
View
JTAER
2007
104views more  JTAER 2007»
13 years 7 months ago
Key Drivers of Mobile Commerce Adoption. An Exploratory Study of Spanish Mobile Users
Despite dramatic differences between non-store shoppers were discovered, very limited research has been conducted to examine them. This paper analyses the background of M-commerce...
Enrique Bigné, Carla Ruiz-Mafé, Silv...
CSUR
2000
101views more  CSUR 2000»
13 years 7 months ago
Extracting usability information from user interface events
to extract information at a level of abstraction that is useful to investigators interested in analyzing application usage or evaluating usability. This survey examines computer-ai...
David M. Hilbert, David F. Redmiles
DM
2002
186views more  DM 2002»
13 years 7 months ago
Coloring Eulerian triangulations of the projective plane
A simple characterization of the 3, 4, or 5-colorable Eulerian triangulations of the projective plane is given. Key words: Projective plane, triangulation, coloring, Eulerian grap...
Bojan Mohar
JOC
2000
181views more  JOC 2000»
13 years 7 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
ALGORITHMICA
1999
141views more  ALGORITHMICA 1999»
13 years 7 months ago
Design and Implementation of a Practical Parallel Delaunay Algorithm
Abstract. This paper describes the design and implementation of a practical parallel algorithm for Delaunay triangulation that works well on general distributions. Although there h...
Guy E. Blelloch, Jonathan C. Hardwick, Gary L. Mil...