• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 31,710
Next 10 →

USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW

by Viswanath Venkatesh, Michael G. Morris, Gordon B. Davis, Fred D. Davis , 2003
"... Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3) formu ..."
Abstract - Cited by 1807 (10 self) - Add to MetaCart
of the variance in user intentions to use information technology. Next, a unified model, called the Unified Theory of Acceptance and Use of Technology (UTAUT), was formulated, with four core determinants of intention and usage, and up to four moderators of key relationships. UTAUT was then tested using

Tinypk: securing sensor networks with public key technology

by Ronald Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus - In SASN ’04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks , 2004
"... Wireless networks of miniaturized, low-power sensor/actuator devices are poised to become widely used in commercial and military environments. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the ..."
Abstract - Cited by 151 (0 self) - Add to MetaCart
the design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two sensor networks. Our work is novel in that PK technology was commonly believed to be too inefficient for use on low-power devices

Next Century Challenges: Mobile Networking for “Smart Dust”

by J. M. Kahn, R. H. Katz , K. S. J. Pister , 1999
"... Large-scale networks of wireless sensors are becoming an active topic of research. Advances in hardware technology and engineering design have led to dramatic reductions in size, power consumption and cost for digital circuitry, wire-less communications and Micro ElectroMechanical Systems (MEMS). Th ..."
Abstract - Cited by 625 (1 self) - Add to MetaCart
the key elements of the emergent technology of “Smart Dust ” and outline the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network nodes co-located within a small volume.

Ontologies: Silver Bullet for Knowledge Management and Electronic Commerce

by Dieter Fensel , 2007
"... Currently computers are changing from single isolated devices to entry points into a world wide network of information exchange and business transactions called the World Wide Web (WWW). Therefore support in the exchange of data, information, and knowledge exchange is becoming the key issue in cur ..."
Abstract - Cited by 656 (45 self) - Add to MetaCart
Currently computers are changing from single isolated devices to entry points into a world wide network of information exchange and business transactions called the World Wide Web (WWW). Therefore support in the exchange of data, information, and knowledge exchange is becoming the key issue

Healthcare: Key Technologies for Europe

by unknown authors
"... 2. The socio-economic environment.........................................................................6 The demographic development..........................................................................................7 The enlargement of the European Union.................................... ..."
Abstract - Add to MetaCart
2. The socio-economic environment.........................................................................6 The demographic development..........................................................................................7 The enlargement of the European Union............................................................................8

System architecture directions for networked sensors

by Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, Kristofer Pister - IN ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS , 2000
"... Technological progress in integrated, low-power, CMOS communication devices and sensors makes a rich design space of networked sensors viable. They can be deeply embedded in the physical world or spread throughout our environment. The missing elements are an overall system architecture and a methodo ..."
Abstract - Cited by 1789 (58 self) - Add to MetaCart
Technological progress in integrated, low-power, CMOS communication devices and sensors makes a rich design space of networked sensors viable. They can be deeply embedded in the physical world or spread throughout our environment. The missing elements are an overall system architecture and a

GPFS: A Shared-Disk File System for Large Computing Clusters

by Frank Schmuck, Roger Haskin - In Proceedings of the 2002 Conference on File and Storage Technologies (FAST , 2002
"... GPFS is IBM's parallel, shared-disk file system for cluster computers, available on the RS/6000 SP parallel supercomputer and on Linux clusters. GPFS is used on many of the largest supercomputers in the world. GPFS was built on many of the ideas that were developed in the academic community ove ..."
Abstract - Cited by 521 (3 self) - Add to MetaCart
over the last several years, particularly distributed locking and recovery technology. To date it has been a matter of conjecture how well these ideas scale. We have had the opportunity to test those limits in the context of a product that runs on the largest systems in existence. While in many cases

Image retrieval: ideas, influences, and trends of the new age

by Ritendra Datta, Dhiraj Joshi, Jia Li, James Z. Wang - ACM COMPUTING SURVEYS , 2008
"... We have witnessed great interest and a wealth of promise in content-based image retrieval as an emerging technology. While the last decade laid foundation to such promise, it also paved the way for a large number of new techniques and systems, got many new people involved, and triggered stronger ass ..."
Abstract - Cited by 485 (13 self) - Add to MetaCart
We have witnessed great interest and a wealth of promise in content-based image retrieval as an emerging technology. While the last decade laid foundation to such promise, it also paved the way for a large number of new techniques and systems, got many new people involved, and triggered stronger

Key Technologies for Construction of Seabed Base

by unknown authors
"... By the exhaustion of natural resources and the aggravation of the food situation, many countries are going ahead with devel-opment of the ocean space and ocean resources. To expand the border of human life, it is necessary to develop the underwater space. To perform these objectives, it is required ..."
Abstract - Add to MetaCart
to construct and secure a seabed base. The construction of a seabed base will also be the motive power for economy growth in the future. The key technologies to construct a seabed base under high pressure and low temperature conditions are the extreme engineering technologies and they are some parts of space

The Case for Energy-Proportional Computing

by Luiz André Barroso, Urs Hölzle
"... Energy-proportional designs would enable large energy savings in servers, potentially doubling their efficiency in real-life use. Achieving energy proportionality will require significant improvements in the energy usage profile of every system component, particularly the memory and disk subsystems. ..."
Abstract - Cited by 469 (2 self) - Add to MetaCart
. Energy efficiency, a new focus for general-purpose computing, has been a major technology driver in the mobile and embedded areas for some time. Earlier work emphasized extending battery life, but it has since expanded to include peak power reduction because thermal constraints began to limit further CPU
Next 10 →
Results 1 - 10 of 31,710
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University