• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,292
Next 10 →

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
of the work 254 HACKMAN AND OLDHAM setting and the device of the autonomous work group. Absent from the approach, for example, are explicit means for diagnosing a work system prior to change (to ascertain what "should" be changed, and how), or for evaluating in systematic terms the outcomes

A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks

by Gavin Holland, Nitin H. Vaidya, Paramvir Bahl , 2001
"... Wireless local area networks (W-LANs) have become increasingly popular due to the recent availability of affordable devices that are capable of communicating at high data rates. These high rates are possible, in part, through new modulation schemes that are optimized for the channel conditions bring ..."
Abstract - Cited by 484 (5 self) - Add to MetaCart
. Users are given the option to either select an operational data rate manually or to let the device automatically choose the appropriate modulation scheme (data rate) to match the prevailing conditions. Automatic rate selection protocols have been studied for cellular networks but there have been

Interactive Control of Avatars Animated with Human Motion Data

by Jehee Lee, Jinxiang Chai, Paul S. A. Reitsma, Jessica K. Hodgins, Nancy S. Pollard , 2002
"... Real-time control of three-dimensional avatars is an important problem in the context of computer games and virtual environments. Avatar animation and control is difficult, however, because a large repertoire of avatar behaviors must be made available, and the user must be able to select from this s ..."
Abstract - Cited by 369 (38 self) - Add to MetaCart
this set of behaviors, possibly with a low-dimensional input device. One appealing approach to obtaining a rich set of avatar behaviors is to collect an extended, unlabeled sequence of motion data appropriate to the application. In this paper, we show that such a motion database can be preprocessed

Sampling signals with finite rate of innovation

by Martin Vetterli, Pina Marziliano, Thierry Blu - IEEE Transactions on Signal Processing , 2002
"... Abstract—Consider classes of signals that have a finite number of degrees of freedom per unit of time and call this number the rate of innovation. Examples of signals with a finite rate of innovation include streams of Diracs (e.g., the Poisson process), nonuniform splines, and piecewise polynomials ..."
Abstract - Cited by 350 (67 self) - Add to MetaCart
polynomials. Even though these signals are not bandlimited, we show that they can be sampled uniformly at (or above) the rate of innovation using an appropriate kernel and then be perfectly reconstructed. Thus, we prove sampling theorems for classes of signals and kernels that generalize the classic

Terabit burst switching

by Jonathan S. Turner - J. of High Speed Networks , 1999
"... This report summarizes the results of an architectural study on Terabit Burst Switching. The purpose of this study was to explore alternative architectures for very high performance switching for data communication, using a combination of optical and electronic technologies. We explore two alternati ..."
Abstract - Cited by 295 (10 self) - Add to MetaCart
rests on the development of inexpensive optical wavelength conversion devices. Appropriate devices could be available in ve to ten years.

Direct cortical control of 3d neuroprosthetic devices

by Dawn M. Taylor, Stephen I. Helms Tillery, Andrew B. Schwartz - Science , 2002
"... Three-dimensional (3D) movement of neuroprosthetic devices can be con-trolled by the activity of cortical neurons when appropriate algorithms are used to decode intended movement in real time. Previous studies assumed that neurons maintain Þxed tuning properties, and the studies used subjects who we ..."
Abstract - Cited by 263 (5 self) - Add to MetaCart
Three-dimensional (3D) movement of neuroprosthetic devices can be con-trolled by the activity of cortical neurons when appropriate algorithms are used to decode intended movement in real time. Previous studies assumed that neurons maintain Þxed tuning properties, and the studies used subjects who

The Web Service Modeling Framework WSMF

by D. Fensel, C. Bussler, Y. Ding, B. Omelayenko - ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS , 2001
"... Web Services will transform the web from a collection of information into a distributed device of computation. In order to employ their full potential, appropriate description means for web services need to be developed. For this purpose we define a fullfledged Web Service Modeling Framework (WSMF ..."
Abstract - Cited by 305 (36 self) - Add to MetaCart
Web Services will transform the web from a collection of information into a distributed device of computation. In order to employ their full potential, appropriate description means for web services need to be developed. For this purpose we define a fullfledged Web Service Modeling Framework

A Forward-Secure Public-Key Encryption Scheme

by Ran Canetti, Shai Halevi, Jonathan Katz , 2003
"... Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious and realistic concern. In an e#ort to mitigate the damage caused by exposure of secret data (e.g., keys) stored on such devices, the paradigm of forward security was int ..."
Abstract - Cited by 251 (14 self) - Add to MetaCart
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious and realistic concern. In an e#ort to mitigate the damage caused by exposure of secret data (e.g., keys) stored on such devices, the paradigm of forward security

Integrality and Separability of Input Devices

by Robert J. K. Jacob, Linda E. Sibert, Daniel C. Mcfarlane, M. Preston Mullen - ACM Transactions on Computer-Human Interaction , 1994
"... Current input device taxonomies and other frameworks typically emphasize the mechanical structure of input devices. We suggest that selecting an appropriate input device for an interactive task requires looking beyond the physical structure of devices to the deeper perceptual structure of the task, ..."
Abstract - Cited by 159 (5 self) - Add to MetaCart
Current input device taxonomies and other frameworks typically emphasize the mechanical structure of input devices. We suggest that selecting an appropriate input device for an interactive task requires looking beyond the physical structure of devices to the deeper perceptual structure of the task

Time Synchronization in Ad Hoc Networks

by Kay Römer - IN ACM SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC 01 , 2001
"... Ubiquitous computing environments are typically based upon ad hoc networks of mobile computing devices. These devices may be equipped with sensor hardware to sense the physical environment and may be attached to real world artifacts to form so{called smart things. The data sensed by various smart th ..."
Abstract - Cited by 210 (13 self) - Add to MetaCart
Ubiquitous computing environments are typically based upon ad hoc networks of mobile computing devices. These devices may be equipped with sensor hardware to sense the physical environment and may be attached to real world artifacts to form so{called smart things. The data sensed by various smart
Next 10 →
Results 1 - 10 of 5,292
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University