• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11,939
Next 10 →

USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW

by Viswanath Venkatesh, Michael G. Morris, Gordon B. Davis, Fred D. Davis , 2003
"... Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3) formu ..."
Abstract - Cited by 1807 (10 self) - Add to MetaCart
Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3

Log In and User Validation.....................................................................................................3

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

Automatically validating temporal safety properties of interfaces

by Thomas Ball, Sriram K. Rajamani , 2001
"... We present a process for validating temporal safety properties of software that uses a well-defined interface. The process requires only that the user state the property of interest. It then automatically creates abstractions of C code using iterative refinement, based on the given property. The pro ..."
Abstract - Cited by 433 (21 self) - Add to MetaCart
We present a process for validating temporal safety properties of software that uses a well-defined interface. The process requires only that the user state the property of interest. It then automatically creates abstractions of C code using iterative refinement, based on the given property

Reexamining the Cluster Hypothesis: Scatter/Gather on Retrieval Results

by Marti A. Hearst, Jan O. Pedersen , 1996
"... We present Scatter/Gather, a cluster-based document browsing method, as an alternative to ranked titles for the organization and viewing of retrieval results. We systematically evaluate Scatter/Gather in this context and find significant improvements over similarity search ranking alone. This resul ..."
Abstract - Cited by 480 (5 self) - Add to MetaCart
. This result provides evidence validating the cluster hypothesis which states that relevant documents tend to be more similar to each other than to non-relevant documents. We describe a system employing Scatter/Gather and demonstrate that users are able to use this system close to its full potential. 1

2003): User Validation of a Mobile Tourism Service

by Barbara Schmidt-belz, Fraunhofer Fit, Stefan Poslad, Queen Mary - Proceedings of the Workshop W1 "HCI in Mobile Guides 2003", in conjunction with Mobile HCI’03
"... This paper reports the findings of a user trial of the CRUMPET system. CRUMPET has realized a personalized, location-aware tourism service, implemented as a multi-agent system, which supports seamless roaming, service mediation and interaction facilitation. Prototypes of the system have been trialle ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
trialled by users at four European trial sites. The user validation was based on a field test, a supplementary survey on information needs of tourists, a summative evaluation of the user-perceived qualities of the system. The trial results suggest the essential features and requirements of future mobile

User Validation of a Nomadic Exhibition Guide

by Barbara Schmidt-belz, Fabian Hermann - Mobile HCI 2004 Glasgow , 2004
"... This paper reports on the user-oriented development of a nomadic exhibition guide for trade fair visitors. The system is situation aware, and personalized, supporting all phases from planning at home, over the mobile situation when visiting the exhibition, until the evaluation afterwards. The pro ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
This paper reports on the user-oriented development of a nomadic exhibition guide for trade fair visitors. The system is situation aware, and personalized, supporting all phases from planning at home, over the mobile situation when visiting the exhibition, until the evaluation afterwards

User Validation of Image Quality Assessment Algorithms

by Peter Longhurst, Alan Chalmers , 2000
"... ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
Abstract not found

User Validation of Requirements Seen under a Temporal Logic Perspective

by Vito Veneziano, Sara Jones, Carol Britton, Alberto Pasquini
"... Intrinsic temporal components in interactive systems may lead users into error during the validation stage. Interactive systems are a typical example of how a temporal component may be seen as intrinsic, since such systems consist of sequences of possible events and, as such, can exist only along a ..."
Abstract - Add to MetaCart
Intrinsic temporal components in interactive systems may lead users into error during the validation stage. Interactive systems are a typical example of how a temporal component may be seen as intrinsic, since such systems consist of sequences of possible events and, as such, can exist only along a

Prefuse: A toolkit for interactive information visualization

by Jeffrey Heer, Stuart K. Card, James A. Landay - In ACM Human Factors in Computing Systems (CHI , 2005
"... In this demonstration we present prefuse, an extensible user interface toolkit for building interactive information visualization applications, including node-link diagrams, containment diagrams, and visualizations of unstructured (edge-free) data such as scatter plots and timelines. prefuse data in ..."
Abstract - Cited by 358 (7 self) - Add to MetaCart
In this demonstration we present prefuse, an extensible user interface toolkit for building interactive information visualization applications, including node-link diagrams, containment diagrams, and visualizations of unstructured (edge-free) data such as scatter plots and timelines. prefuse data

Transactional Locking II

by Dave Dice, Ori Shalev, Nir Shavit - In Proc. of the 20th Intl. Symp. on Distributed Computing , 2006
"... Abstract. The transactional memory programming paradigm is gaining momentum as the approach of choice for replacing locks in concurrent programming. This paper introduces the transactional locking II (TL2) algorithm, a software transactional memory (STM) algorithm based on a combination of commit-ti ..."
Abstract - Cited by 359 (17 self) - Add to MetaCart
periods of unsafe execution, that is, using its novel version-clock validation, user code is guaranteed to operate only on consistent memory states, and (3) in a sequence of high performance benchmarks, while providing these new properties, it delivered overall performance comparable to (and in many cases
Next 10 →
Results 1 - 10 of 11,939
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University