Sciweavers

HICSS
2005
IEEE
131views Biometrics» more  HICSS 2005»
13 years 10 months ago
Analysis of Overlay Network Impact on Dependability
Recently, peer-to-peer systems have become widely accepted and are probably the most recognizable examples of distributed applications. As they are maturing and their functionalit...
Piotr Karwaczynski, Jan Kwiatkowski
HICSS
2005
IEEE
86views Biometrics» more  HICSS 2005»
13 years 10 months ago
Towards a Typology for Designing Inter-Organisational Controls for Network Organisations
In this paper a typology is introduced for interorganisational control mechanisms for network organisations. We also show how the design and analysis of such inter-organisational ...
Vera Kartseva, Yao-Hua Tan
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
13 years 10 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
13 years 10 months ago
Email Chronemics: Unobtrusive Profiling of Response Times
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
Yoram M. Kalman, Sheizaf Rafaeli
HICSS
2005
IEEE
123views Biometrics» more  HICSS 2005»
13 years 10 months ago
Enterprise Architecting: Critical Problems
An enterprise architecture (EA) identifies the main components of the organization, its information systems, the ways in which these components work together in order to achieve d...
Stephen H. Kaisler, Frank Armour, Michael Valivull...
HICSS
2005
IEEE
137views Biometrics» more  HICSS 2005»
13 years 10 months ago
Facilitating Human Collaboration with Agents
Ad hoc cross-agency teams are often needed to deal with actual, imminent, or potential crises that involve multiple geographic or political jurisdictions or require coordinated ex...
James E. Just, Mark R. Cornwell, Michael N. Huhns
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
13 years 10 months ago
An Experimental Investigation of Location-Based Services
Whereas the conventional applications mostly assume stationary or fixed users, more and more emphasis is placed on mobility, the need for people to stay connected while moving aro...
Iris A. Junglas
HICSS
2005
IEEE
132views Biometrics» more  HICSS 2005»
13 years 10 months ago
Web Browser Control Using EMG Based Sub Vocal Speech Recognition
—Subvocal electromyogram (EMG) signal classification is used to control a modified web browser interface. Recorded surface signals from the larynx and sublingual areas below the ...
Chuck Jorgensen, Kim Binsted
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
13 years 10 months ago
Common Data Model for Design Document Exchange in Business-to-Business Networks
Design documents can be exchanged in business-tobusiness networks through Product Data Management (PDM) system integration. This rarely used approach provides new possibilities fo...
Katrine Jokinen, Jukka Borgman, Reijo Sulonen