3,089 research outputs found

    Low-rank semidefinite programming for the MAX2SAT problem

    Full text link
    This paper proposes a new algorithm for solving MAX2SAT problems based on combining search methods with semidefinite programming approaches. Semidefinite programming techniques are well-known as a theoretical tool for approximating maximum satisfiability problems, but their application has traditionally been very limited by their speed and randomized nature. Our approach overcomes this difficult by using a recent approach to low-rank semidefinite programming, specialized to work in an incremental fashion suitable for use in an exact search algorithm. The method can be used both within complete or incomplete solver, and we demonstrate on a variety of problems from recent competitions. Our experiments show that the approach is faster (sometimes by orders of magnitude) than existing state-of-the-art complete and incomplete solvers, representing a substantial advance in search methods specialized for MAX2SAT problems.Comment: Accepted at AAAI'19. The code can be found at https://github.com/locuslab/mixsa

    Beyond Routine: Symbolic Adoption, Extended Use, and Emergent Use of Complex Information Systems in the Mandatory Organizational Context

    Get PDF
    Organizational investments in complex information systems (CIS) have reached a record high. However, the underutilization of these expensive CIS prevents organizations from achieving the advertised return on investment. This study attempts to address this issue from the perspective of extended use and emergent use. Extended use concerns using more of the technology features, while emergent use concerns applying the technology in a novel manner to support task performance. To study uses that surpass routine use, a special focus is placed on the motivational factor that drives these behaviors. Drawing upon the insights from information system (IS) infusion, the IS continuance model, and the symbolic adoption theory, this paper proposes a research model for understanding extended and emergent use in mandatory organizational contexts. The model was examined in two large manufacturing firms that had implemented CIS for at least two years. The results suggest that perceived usefulness, satisfaction, and symbolic adoption influence extended use, and that perceived usefulness, symbolic adoption, and extended use affect emergent use. More importantly, the concept of symbolic adoption offers a theoretical explanation for extended and emergent use from the motivational point of view. Implications for theory and practice are also discussed

    Explaining Employees Extended Use of Complex Information Systems

    Get PDF
    Investments in complex information systems by organizations reached a record high of U.S.$26.7 billion in 2004. Yet, organizations seldom use these systems to the fullest extent and attain the expected return on investment. This paper addresses the issue of system underutilization by investigating Extended Use, which refers to using more system features to support one\u27s tasks. Extended Use was examined in the nomological networks of the IS Continuance (ISC) Model and Technology Acceptance Model (TAM). A field survey was conducted in a large manufacturing firm that had successfully implemented a popular enterprise resource planning solution for more than 2 years. All paths in both ISC and TAM were statistically significant. A synthesized model was later proposed and examined in a post hoc analysis. The results indicate that the synthesized model, as compared to ISC and TAM, explained slightly higher variances in Extended Use, Perceived Usefulness (PU), and Satisfaction. Specifically, both Perceived Ease of Use (PEOU) and PU both affected Extended Use. Interestingly, Satisfaction has no direct impact on Extended Use in the presence of PU and PEOU. In contrast to most technology acceptance research, PEOU has a stronger behavioral impact than that of PU. This research provides a framework that explains Extended Use and is one of the few studies that investigates IS use behavior that exceeds simple, shallow, and routine use
    corecore