Sciweavers

6031 search results - page 1120 / 1207
» Communicating Transaction Processes
Sort
View
CCS
2001
ACM
15 years 7 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
SIGUCCS
2000
ACM
15 years 7 months ago
Three Years in the Solution Center
After thirty-plus years of making small “mid-course corrections” types of changes to the support paradigm, many on the Iowa State University campus thought it was time to make...
Frank Poduska
CHI
2010
ACM
15 years 7 months ago
Where is my team: supporting situation awareness with tactile displays
A group of friends visiting a crowded and noisy music festival is an example of a situation where knowing the location of other people is important, but where external factors, su...
Martin Pielot, Oliver Krull, Susanne Boll
SIGGRAPH
1999
ACM
15 years 7 months ago
The VolumePro Real-Time Ray-Casting System
This paper describes VolumePro, the world’s first single-chip realtime volume rendering system for consumer PCs. VolumePro implements ray-casting with parallel slice-by-slice p...
Hanspeter Pfister, Jan Hardenbergh, Jim Knittel, H...
HICSS
1999
IEEE
183views Biometrics» more  HICSS 1999»
15 years 7 months ago
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution toward understanding IS usage and IS acceptance behaviors [6, 19]. However, as noted by seve...
Yogesh Malhotra, Dennis F. Galletta
« Prev « First page 1120 / 1207 Last » Next »