Sciweavers

HICSS
2006
IEEE
165views Biometrics» more  HICSS 2006»
13 years 11 months ago
Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast
Secure multicast has a variety of applications in ecommerce, e-banking, command and control, video-ondemand, and other internet-based services. In this paper, we present algorithm...
Mohammad Hossain Heydari, Linda Morales, Ivan Hal ...
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
13 years 11 months ago
Hotlist or Bibliography? A Case of Genre on the Web
Bibliography—the collection, description, and arrangement of information items—is a vibrant activity and a popular form of expression on the internet. Yet, fashionable forms o...
David G. Hendry, Allyson Carlyle
HICSS
2006
IEEE
86views Biometrics» more  HICSS 2006»
13 years 11 months ago
How Voluntary Online Learning Communities Emerge in Blended Courses
A comparative case study used content analysis to observe the emergence of voluntary online learning communities in two blended courses. The study developed an interaction-based a...
Robert Heckman, Qing Li, Xue Xiao
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
13 years 11 months ago
Experiences and Media Perceptions of Senders and Receivers in Knowledge Transfer: An Exploratory Study
Guided by knowledge transfer (KT) literature and Channel Expansion Theory (CET), we explore the relationship between the KT process, role-based experiences and media perceptions i...
Bryan K. Hasty, Anne P. Massey, Susan A. Brown
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
13 years 11 months ago
Using Social Network Analysis to Test an IT-Enabled Business Process Reengineering Theory
After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) ...
Nik R. Hassan, Tom C. Richards, Jack D. Becker
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
13 years 11 months ago
A Taxonomy for RFID
—Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriente...
Taimur Hassan, Samir Chatterjee
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
13 years 11 months ago
Programming Education in the Era of the Internet: A Paradigm Shift
Over the last several years, the Computer Science (CS) community has put a great deal of effort in to the area of security research, and have made great advances. Counterintuitive...
Scott Harrison, Nadine Hanebutte, Jim Alves-Foss
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
13 years 11 months ago
Learning about Interoperability for Emergency Response: Geographic Information Technologies and the World Trade Center Crisis
Geographic information technologies (GIT) have the potential to integrate information among multiple organizations. In fact, some of the most impressive advantages of using geo-sp...
Teresa M. Harrison, José Ramón Gil-G...
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
13 years 11 months ago
Controls in Flexible Software Development
Control and flexibility may appear an unlikely pair. However, we propose that effective flexible software development processes must still provide clear control mechanisms to mana...
Michael L. Harris, Alan R. Hevner, Rosann Webb Col...
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
13 years 11 months ago
A Case Study of a Longstanding Online Community of Practice Involving Critical Care and Advanced Practice Nurses
The aims of this study are: (1) to examine to what extent critical care and advanced practice nurses’ participation in an online listserv constituted a community of practice, an...
Noriko Hara, Khe Foon Hew