Sciweavers

1124 search results - page 199 / 225
» Refined quorum systems
Sort
View
IJMMS
2006
171views more  IJMMS 2006»
14 years 11 months ago
The role of moderating factors in user technology acceptance
Along with increasing investments in new technologies, user technology acceptance becomes a frequently studied topic in the information systems discipline. The last two decades ha...
Heshan Sun, Ping Zhang 0002
IPM
2006
64views more  IPM 2006»
14 years 11 months ago
Text mining without document context
We consider a challenging clustering task: the clustering of muti-word terms without document co-occurrence information in order to form coherent groups of topics. For this task, ...
Eric SanJuan, Fidelia Ibekwe-Sanjuan
JSAC
2008
106views more  JSAC 2008»
14 years 11 months ago
Enhanced multiuser random beamforming: dealing with the not so large number of users case
We consider the downlink of a wireless system with an M-antenna base station and K single-antenna users. A limited feedback-based scheduling and precoding scenario is considered th...
Marios Kountouris, David Gesbert, Thomas Sälz...
TOG
2008
94views more  TOG 2008»
14 years 11 months ago
Wavelet turbulence for fluid simulation
We present a novel wavelet method for the simulation of fluids at high spatial resolution. The algorithm enables large- and smallscale detail to be edited separately, allowing hig...
Theodore Kim, Nils Thürey, Doug L. James, Mar...
TSE
2008
128views more  TSE 2008»
14 years 11 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón