Results 1 - 10
of
11,939
USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW
, 2003
"... Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3) formu ..."
Abstract
-
Cited by 1807 (10 self)
- Add to MetaCart
Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3
Automatically validating temporal safety properties of interfaces
, 2001
"... We present a process for validating temporal safety properties of software that uses a well-defined interface. The process requires only that the user state the property of interest. It then automatically creates abstractions of C code using iterative refinement, based on the given property. The pro ..."
Abstract
-
Cited by 433 (21 self)
- Add to MetaCart
We present a process for validating temporal safety properties of software that uses a well-defined interface. The process requires only that the user state the property of interest. It then automatically creates abstractions of C code using iterative refinement, based on the given property
Reexamining the Cluster Hypothesis: Scatter/Gather on Retrieval Results
, 1996
"... We present Scatter/Gather, a cluster-based document browsing method, as an alternative to ranked titles for the organization and viewing of retrieval results. We systematically evaluate Scatter/Gather in this context and find significant improvements over similarity search ranking alone. This resul ..."
Abstract
-
Cited by 480 (5 self)
- Add to MetaCart
. This result provides evidence validating the cluster hypothesis which states that relevant documents tend to be more similar to each other than to non-relevant documents. We describe a system employing Scatter/Gather and demonstrate that users are able to use this system close to its full potential. 1
2003): User Validation of a Mobile Tourism Service
- Proceedings of the Workshop W1 "HCI in Mobile Guides 2003", in conjunction with Mobile HCI’03
"... This paper reports the findings of a user trial of the CRUMPET system. CRUMPET has realized a personalized, location-aware tourism service, implemented as a multi-agent system, which supports seamless roaming, service mediation and interaction facilitation. Prototypes of the system have been trialle ..."
Abstract
-
Cited by 11 (0 self)
- Add to MetaCart
trialled by users at four European trial sites. The user validation was based on a field test, a supplementary survey on information needs of tourists, a summative evaluation of the user-perceived qualities of the system. The trial results suggest the essential features and requirements of future mobile
User Validation of a Nomadic Exhibition Guide
- Mobile HCI 2004 Glasgow
, 2004
"... This paper reports on the user-oriented development of a nomadic exhibition guide for trade fair visitors. The system is situation aware, and personalized, supporting all phases from planning at home, over the mobile situation when visiting the exhibition, until the evaluation afterwards. The pro ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
This paper reports on the user-oriented development of a nomadic exhibition guide for trade fair visitors. The system is situation aware, and personalized, supporting all phases from planning at home, over the mobile situation when visiting the exhibition, until the evaluation afterwards
User Validation of Requirements Seen under a Temporal Logic Perspective
"... Intrinsic temporal components in interactive systems may lead users into error during the validation stage. Interactive systems are a typical example of how a temporal component may be seen as intrinsic, since such systems consist of sequences of possible events and, as such, can exist only along a ..."
Abstract
- Add to MetaCart
Intrinsic temporal components in interactive systems may lead users into error during the validation stage. Interactive systems are a typical example of how a temporal component may be seen as intrinsic, since such systems consist of sequences of possible events and, as such, can exist only along a
Prefuse: A toolkit for interactive information visualization
- In ACM Human Factors in Computing Systems (CHI
, 2005
"... In this demonstration we present prefuse, an extensible user interface toolkit for building interactive information visualization applications, including node-link diagrams, containment diagrams, and visualizations of unstructured (edge-free) data such as scatter plots and timelines. prefuse data in ..."
Abstract
-
Cited by 358 (7 self)
- Add to MetaCart
In this demonstration we present prefuse, an extensible user interface toolkit for building interactive information visualization applications, including node-link diagrams, containment diagrams, and visualizations of unstructured (edge-free) data such as scatter plots and timelines. prefuse data
Transactional Locking II
- In Proc. of the 20th Intl. Symp. on Distributed Computing
, 2006
"... Abstract. The transactional memory programming paradigm is gaining momentum as the approach of choice for replacing locks in concurrent programming. This paper introduces the transactional locking II (TL2) algorithm, a software transactional memory (STM) algorithm based on a combination of commit-ti ..."
Abstract
-
Cited by 359 (17 self)
- Add to MetaCart
periods of unsafe execution, that is, using its novel version-clock validation, user code is guaranteed to operate only on consistent memory states, and (3) in a sequence of high performance benchmarks, while providing these new properties, it delivered overall performance comparable to (and in many cases
Results 1 - 10
of
11,939