• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 108,682
Next 10 →

A blueprint for introducing disruptive technology into the internet

by Larry Peterson, Tom Anderson, David Culler, Timothy Roscoe , 2002
"... This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay-based testbed. Unlike conventional network testbeds, however, we advocate an approach that supports bot ..."
Abstract - Cited by 593 (43 self) - Add to MetaCart
This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay-based testbed. Unlike conventional network testbeds, however, we advocate an approach that supports

The Skill Content of Recent Technological Change: An Empirical Exploration

by David H. Autor, Frank Levy, Richard J. Murnane , 2000
"... Recent empirical and case study evidence documents a strong association between the adoption of computers and increased use of college educated or non-production workers. With few exceptions, the conceptual link explaining how computer technology complements skilled labor or substitutes for unskille ..."
Abstract - Cited by 643 (28 self) - Add to MetaCart
Recent empirical and case study evidence documents a strong association between the adoption of computers and increased use of college educated or non-production workers. With few exceptions, the conceptual link explaining how computer technology complements skilled labor or substitutes

The Cornerstones of Competitive Advantage: A Resource Based View,

by Margaret A Peteraf , J L Kellogg - Strategic Management Journal , 1993
"... JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about J ..."
Abstract - Cited by 978 (1 self) - Add to MetaCart
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about

Surround-screen projection-based virtual reality: The design and implementation of the CAVE

by Carolina Cruz-neira, Daniel J. Sandin, Thomas A. Defanti , 1993
"... Abstract Several common systems satisfy some but not all of the VR This paper describes the CAVE (CAVE Automatic Virtual Environment) virtual reality/scientific visualization system in detail and demonstrates that projection technology applied to virtual-reality goals achieves a system that matches ..."
Abstract - Cited by 725 (27 self) - Add to MetaCart
Abstract Several common systems satisfy some but not all of the VR This paper describes the CAVE (CAVE Automatic Virtual Environment) virtual reality/scientific visualization system in detail and demonstrates that projection technology applied to virtual-reality goals achieves a system that matches

Role-Based Access Control

by David Ferraiolo, Richard Kuhn - In 15th NIST-NCSC National Computer Security Conference , 1992
"... While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of a ..."
Abstract - Cited by 477 (6 self) - Add to MetaCart
of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC. 1 Introduction

Determinants of perceived ease of use Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model.

by Viswanath Venkatesh - Information Systems Research , 2000
"... M uch previous research has established that perceived ease of use is an important factor influencing user acceptance and usage behavior of information technologies. However, very little research has been conducted to understand how that perception forms and changes over time. The current work pres ..."
Abstract - Cited by 493 (2 self) - Add to MetaCart
M uch previous research has established that perceived ease of use is an important factor influencing user acceptance and usage behavior of information technologies. However, very little research has been conducted to understand how that perception forms and changes over time. The current work

Value-Based Software Engineering

by Barry W. Boehm - ACM Software Engineering Notes , 2003
"... Abstract—This paper provides a definition of the term “software engineering ” and a survey of the current state of the art and likely future trends in the field. The survey covers the technology available in the various phases of the software life cycle—requirements engineering, design, coding, test ..."
Abstract - Cited by 472 (32 self) - Add to MetaCart
Abstract—This paper provides a definition of the term “software engineering ” and a survey of the current state of the art and likely future trends in the field. The survey covers the technology available in the various phases of the software life cycle—requirements engineering, design, coding

Defining Virtual Reality: Dimensions Determining Telepresence

by Jonathan Steuer - JOURNAL OF COMMUNICATION , 1992
"... Virtual reality (VR) is typically defined in terms of technological hardware. This paper attempts to cast a new, variable-based definition of virtual reality that can be used to classify virtual reality in relation to other media. The defintion of virtual reality is based on concepts of "presen ..."
Abstract - Cited by 557 (0 self) - Add to MetaCart
Virtual reality (VR) is typically defined in terms of technological hardware. This paper attempts to cast a new, variable-based definition of virtual reality that can be used to classify virtual reality in relation to other media. The defintion of virtual reality is based on concepts of "

Image retrieval: Current techniques, promising directions and open issues

by Yong Rui, Thomas S. Huang - Journal of Visual Communication and Image Representation , 1999
"... This paper provides a comprehensive survey of the technical achievements in the research area of image retrieval, especially content-based image retrieval, an area that has been so active and prosperous in the past few years. The survey includes 100+ papers covering the research aspects of image fea ..."
Abstract - Cited by 507 (15 self) - Add to MetaCart
feature representation and extraction, multidimensional indexing, and system design, three of the fundamental bases of content-based image retrieval. Furthermore, based on the state-of-the-art technology available now and the demand from real-world applications, open research issues are identified

A survey of industrial model predictive control technology

by S. Joe Qin , Thomas A. Badgwell , 2003
"... This paper provides an overview of commercially available model predictive control (MPC) technology, both linear and nonlinear, based primarily on data provided by MPC vendors. A brief history of industrial MPC technology is presented first, followed by results of our vendor survey of MPC control an ..."
Abstract - Cited by 460 (4 self) - Add to MetaCart
This paper provides an overview of commercially available model predictive control (MPC) technology, both linear and nonlinear, based primarily on data provided by MPC vendors. A brief history of industrial MPC technology is presented first, followed by results of our vendor survey of MPC control
Next 10 →
Results 1 - 10 of 108,682
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University