Sciweavers

439 search results - page 35 / 88
» Context and Intent in Call Processing
Sort
View
HICSS
1999
IEEE
183views Biometrics» more  HICSS 1999»
15 years 4 months ago
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution toward understanding IS usage and IS acceptance behaviors [6, 19]. However, as noted by seve...
Yogesh Malhotra, Dennis F. Galletta
GRID
2007
Springer
15 years 6 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey
ECTEL
2007
Springer
15 years 6 months ago
Applying Sensemaking in a Mobile Learning Scenario
In this work, a new type of collaborative learning activity is proposed in order to enable students to explore and understand information in highly mobile situations. We call this ...
Gustavo Zurita, Nelson Baloian, Pedro Antunes, Fel...
DC
2006
14 years 12 months ago
Dynamic group communication
Group communication is the basic infrastructure for implementing fault-tolerant replicated servers. While group communication is well understood in the context of static systems (...
André Schiper
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 6 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...