Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
HICSS
2005
IEEE
154views Biometrics» more  HICSS 2005»
12 years 3 months ago
A Metadata Model for Electronic Images
Finding images over the internet can be trying at best. Many industries such as advertising, marketing, image consultants, print media, and medical imaging deal with electronic im...
Regina M. Mathis, Lucinda Caughey
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
12 years 3 months ago
A Multilingual Embodied Conversational Agent
In our paper last year [1], we described our languagetraining program, which utilizes Baldi as a tutor, who guides students through a variety of exercises designed to teach vocabu...
Dominic W. Massaro, Slim Ouni, Michael M. Cohen, R...
HICSS
2005
IEEE
160views Biometrics» more  HICSS 2005»
12 years 3 months ago
Problem Based Learning and the Business School Environment
This paper attempts to create a research cycle for Problem Based Learning and in so doing help substantiate the use of PBL in business school environments. The paper starts with a...
Wm. Benjamin Martz Jr., Morgan M. Shepherd
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
12 years 3 months ago
Differential Interaction and Attribution in Collocated and Distributed Large-Scale Collaboration
Large-scale, group-to-group collaboration is an emerging trend, yet has so far not received much attention. We performed an ethnographic study to examine how interaction and perce...
Gloria Mark, Steve Abrams
HICSS
2005
IEEE
116views Biometrics» more  HICSS 2005»
12 years 3 months ago
Why Does State Government Contract Out Their E-Government Services?
Contracting out government services, especially IT services, has accelerated in recent years in the United States. Based on literature in privatization and contracting out, the au...
Anna Ya Ni, Stuart Bretschneider
HICSS
2005
IEEE
190views Biometrics» more  HICSS 2005»
12 years 3 months ago
Blob Analysis of the Head and Hands: A Method for Deception Detection
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. Blob analysis, a method for analyzing the movement of the head and hands bas...
Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas...
HICSS
2005
IEEE
135views Biometrics» more  HICSS 2005»
12 years 3 months ago
On Space Exploration And Human Error - A Paper on Reliability and Safety
NASA space exploration should largely address a problem class in reliability and risk management stemming primarily from human error, system risk and multi-objective trade-off ana...
David A. Maluf, Yuri Gawdiak, David G. Bell
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
12 years 3 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
HICSS
2005
IEEE
86views Biometrics» more  HICSS 2005»
12 years 3 months ago
Look-Ahead Routing Reduces Wrong Turns in Freenet-Style Peer-to-Peer Systems
Peer-to-Peer protocols and applications have drawn much attention. Freenet is a groundbreaking Peer-to-Peer system that protects the anonymity of information producers, consumers,...
Jens Mache, Eric Anholt, Valentina Grigoreanu, Tim...
HICSS
2005
IEEE
191views Biometrics» more  HICSS 2005»
12 years 3 months ago
Business Models for Online Communities: The Case of the Virtual Worlds Industry in China
The rapid growth of Internet usage has enabled many new online communities to develop. A particularly interesting phenomenon that has arisen through Internet communities is the vi...
Ian MacInnes, Lili Hu
books