Sciweavers

29 search results - page 3 / 6
» Empirical-Based Construction of Reference Models in Public A...
Sort
View
HICSS
1999
IEEE
183views Biometrics» more  HICSS 1999»
13 years 9 months ago
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution toward understanding IS usage and IS acceptance behaviors [6, 19]. However, as noted by seve...
Yogesh Malhotra, Dennis F. Galletta
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 5 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
13 years 10 months ago
Democracy Functions of Information Technology
Information Technology, IT, may play an important part in any community as a supporting tool in the democratic process. The conditions for that to happen are primarily a genuine w...
Gunnar Lidén, Anders Avdic
JSW
2007
185views more  JSW 2007»
13 years 5 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...
IEEECIT
2010
IEEE
13 years 3 months ago
Understanding Resource Provisioning for ClimatePrediction.net
—Peer-to-peer computing, involving the participation of thousands of general purpose, public computers, has established itself as a viable paradigm for executing looselycoupled, ...
Malik Shahzad Kaleem Awan, Stephen A. Jarvis