Sciweavers

35 search results - page 2 / 7
» hicss 2011
Sort
View
HICSS
2011
IEEE
279views Biometrics» more  HICSS 2011»
12 years 9 months ago
A Rule-Based Natural Language Technique for Requirements Discovery and Classification in Open-Source Software Development Projec
Open source projects do have requirements; they are, however, mostly informal, text descriptions found in requests, forums, and other correspondence. Understanding of such require...
Radu Vlas, William N. Robinson
HICSS
2011
IEEE
185views Biometrics» more  HICSS 2011»
12 years 9 months ago
The Impact of Stimuli Characteristics on the Ideation Process: An Evaluation of the Change of Perspective 'Analogy'
Idea generation techniques provide a variety of approaches for supporting an innovation process. Until recently, the space of techniques has been unstructured, and no clear guidel...
Stefan Werner Knoll, Graham Horton
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 9 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
HICSS
2011
IEEE
182views Biometrics» more  HICSS 2011»
12 years 9 months ago
The "S" in Social Network Games: Initiating, Maintaining, and Enhancing Relationships
Social network games embedded within social network sites (SNSs) such as Facebook facilitate play with “Friends” within the SNS. In this study, we look at different dimensions...
Donghee Yvette Wohn, Cliff Lampe, Rick Wash, Nicol...
HICSS
2011
IEEE
203views Biometrics» more  HICSS 2011»
12 years 9 months ago
Will HITECH Heal Patient Data Hemorrhages?
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...
M. Eric Johnson, Nicholas D. Willey