Sciweavers

875 search results - page 146 / 175
» Situated Actions and Cognition
Sort
View
HICSS
2007
IEEE
152views Biometrics» more  HICSS 2007»
15 years 7 months ago
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...
HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
15 years 7 months ago
Ambiguities in Sketch-Based Interfaces
Sketch-based interaction is an intuitive, simple communication method. However, it has several critical aspects, due to difficulties during the interpretation step by the computer...
Danilo Avola, Maria Chiara Caschera, Fernando Ferr...
HICSS
2007
IEEE
151views Biometrics» more  HICSS 2007»
15 years 7 months ago
The Impact of Information Technology on the Temporal Optimization of Supply Chain Performance
The objective of this paper is to suggest a systematic means by which the timing and focus of information technology policies can be used to optimize supply chain performance and ...
Ken Dozier, David Chang
ECOOP
2007
Springer
15 years 7 months ago
Exception Handling: A Field Study in Java and .NET
Most modern programming languages rely on exceptions for dealing with abnormal situations. Although exception handling was a significant improvement over other mechanisms like chec...
Bruno Cabral, Paulo Marques
GECCO
2007
Springer
201views Optimization» more  GECCO 2007»
15 years 7 months ago
Evolving explicit opponent models in game playing
Opponent models are necessary in games where the game state is only partially known to the player, since the player must infer the state of the game based on the opponent’s acti...
Alan J. Lockett, Charles L. Chen, Risto Miikkulain...