Sciweavers

1124 search results - page 199 / 225
» Refined quorum systems
Sort
View
IJMMS
2006
171views more  IJMMS 2006»
15 years 1 months ago
The role of moderating factors in user technology acceptance
Along with increasing investments in new technologies, user technology acceptance becomes a frequently studied topic in the information systems discipline. The last two decades ha...
Heshan Sun, Ping Zhang 0002
82
Voted
IPM
2006
64views more  IPM 2006»
15 years 1 months ago
Text mining without document context
We consider a challenging clustering task: the clustering of muti-word terms without document co-occurrence information in order to form coherent groups of topics. For this task, ...
Eric SanJuan, Fidelia Ibekwe-Sanjuan
JSAC
2008
106views more  JSAC 2008»
15 years 1 months ago
Enhanced multiuser random beamforming: dealing with the not so large number of users case
We consider the downlink of a wireless system with an M-antenna base station and K single-antenna users. A limited feedback-based scheduling and precoding scenario is considered th...
Marios Kountouris, David Gesbert, Thomas Sälz...
TOG
2008
94views more  TOG 2008»
15 years 1 months ago
Wavelet turbulence for fluid simulation
We present a novel wavelet method for the simulation of fluids at high spatial resolution. The algorithm enables large- and smallscale detail to be edited separately, allowing hig...
Theodore Kim, Nils Thürey, Doug L. James, Mar...
TSE
2008
128views more  TSE 2008»
15 years 1 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón