Sciweavers

8825 search results - page 1719 / 1765
» All for one or one for all
Sort
View
87
Voted
EJIS
2007
139views more  EJIS 2007»
15 years 23 days ago
Applying TAM across cultures: the need for caution
The technology acceptance model (TAM) is one of the most widely used behavioural models in the information systems (IS) field. Researchers have used the model to study many differ...
Scott McCoy, Dennis F. Galletta, William R. King
89
Voted
JOC
2006
69views more  JOC 2006»
15 years 23 days ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
109
Voted
JSAC
2006
96views more  JSAC 2006»
15 years 23 days ago
Price-based distributed algorithms for rate-reliability tradeoff in network utility maximization
Abstract--The current framework of network utility maximization for rate allocation and its price-based algorithms assumes that each link provides a fixed-size transmission "p...
Jang-Won Lee, Mung Chiang, A. Robert Calderbank
81
Voted
MLQ
2008
63views more  MLQ 2008»
15 years 23 days ago
The stationary set splitting game
The stationary set splitting game is a game of perfect information of length 1 between two players, unsplit and split, in which unsplit chooses stationarily many countable ordinal...
Paul B. Larson, Saharon Shelah
102
Voted
EOR
2007
93views more  EOR 2007»
15 years 23 days ago
Exact algorithms for procurement problems under a total quantity discount structure
In this paper, we study the procurement problem faced by a buyer who needs to purchase a variety of goods from suppliers applying a so-called total quantity discount policy. This ...
Dries R. Goossens, A. J. T. Maas, Frits C. R. Spie...
« Prev « First page 1719 / 1765 Last » Next »