Sciweavers

HICSS
2005
IEEE
183views Biometrics» more  HICSS 2005»
13 years 10 months ago
A Disruption Analysis in the Mobile Payment Market
Mobile payments are predicted to have a bright future as m-commerce becomes more popular. However, this promising application has not been as successful as anticipated. This can b...
Jan Ondrus, Yves Pigneur
HICSS
2005
IEEE
146views Biometrics» more  HICSS 2005»
13 years 10 months ago
Maintaining Continuous Dependability in Sensor-Based Context-Aware Pervasive Computing Systems
Sensors are often indicative of events of interest, or events which a system should be aware of and should react to. In particular, such indications may reflect unsteadiness or in...
Amir Padovitz, Arkady B. Zaslavsky, Seng Wai Loke,...
HICSS
2005
IEEE
101views Biometrics» more  HICSS 2005»
13 years 10 months ago
Attention and Communication: Decision Scenarios for Teleoperating Robots
The economics of robot manufacturing is driving us toward situations in which a single human operator will be expected to split attention across multiple semiautonomous vehicles, ...
Jeffrey V. Nickerson, Steven Skiena
HICSS
2005
IEEE
99views Biometrics» more  HICSS 2005»
13 years 10 months ago
The Meaning of Arrows: Diagrams and Other Facets in System Sciences Literature
Understanding the use of diagrams and other components of scholarly systems-related papers may inform us about the papers, the field, and the way we think. We analyze 495 papers c...
Jeffrey V. Nickerson
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
13 years 10 months ago
Risk Assessment in Complex Interacting Infrastructure Systems
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
David E. Newman, Bertrand Nkei, Benjamin A. Carrer...
HICSS
2005
IEEE
138views Biometrics» more  HICSS 2005»
13 years 10 months ago
Exploring the Variation in Student Project Team Knowledge Integration Competency
Organizations are increasingly using cross-functional project teams to increase flexibility. The belief is that individuals will be able to share and combine their different knowl...
Sue Newell, Susan Adams, Marcy Crary, Priscilla Gl...
HICSS
2005
IEEE
128views Biometrics» more  HICSS 2005»
13 years 10 months ago
Distributed Sleep-Scheduling Protocols for Energy Conservation in Wireless Networks
This paper presents a distributed sleep scheduling protocol that can be used for implementing synchronous interface sleep for energy conservation in wireless Ad Hoc networks. Cent...
Rohit Naik, Subir K. Biswas, Samir Datta
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
13 years 10 months ago
A Multi-Layered Valuation Framework for Pricing Investment Advisory Services
This paper presents a multi-layered valuation framework for pricing investment advisory services, using service modules as product specification and a reference base for pricing. ...
Dona D. Mommsen-Ghosh
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
13 years 10 months ago
Elephant: Network Intrusion Detection Systems that Don't Forget
Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
Michael G. Merideth, Priya Narasimhan
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
13 years 10 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell