Sciweavers

HICSS
2008
IEEE
128views Biometrics» more  HICSS 2008»
13 years 11 months ago
Service Composition Language to Unify Simulation and Optimization of Supply Chains
Proposed and developed is the language Service Composition (SC) CoJava, which extends the programming language Java with (1) a modular service composition framework; (2) an extens...
Alexander Brodsky, Malak Al-Nory, Hadon Nash
HICSS
2008
IEEE
133views Biometrics» more  HICSS 2008»
13 years 11 months ago
A Study of the Causal Relationship between IT Governance Inhibitors and Its Success in Korea Enterprises
In recent years, the emergence of the term IT Governance (ITG) has pointed to the increasing importance for business of effecting an alignment between its strategic direction and ...
Chi-Hoon Lee, Jung-Hoon Lee, Jong-Sung Park, Kap-Y...
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
13 years 11 months ago
Service Oriented Architecture: Challenges for Business and Academia
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways ...
Amelia Maurizio, James Sager, Peter Jones, Gail Co...
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
13 years 11 months ago
Does Knowledge Management Pay Off?
The resource-based theory of the firm attributes superior firm performance to organizational resources that are valuable, rare, irreplaceable, and not readily reproduced. Aligned ...
Clyde W. Holsapple, Jiming Wu
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
13 years 11 months ago
Performance of a Wireless Unattended Sensor Network in a Freshwater Environment
This effort investigated the use of wireless unattended sensor network motes in the surroundings of a freshwater lake. The network was required to organize, establish and maintain...
John C. McEachen, Juan Casias
HICSS
2008
IEEE
73views Biometrics» more  HICSS 2008»
13 years 11 months ago
Making the Most of IT Governance Software: Understanding Implementation Processes
Hauke Heier, Hans P. Borgman, Thomas H. Hofbauer
HICSS
2008
IEEE
91views Biometrics» more  HICSS 2008»
13 years 11 months ago
Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice Initiatives
Governments are increasingly using collaborative, cross-boundary strategies to face complex social problems. Many of these cross-boundary initiatives have at their core the use, a...
Theresa A. Pardo, José Ramón Gil-Gar...
HICSS
2008
IEEE
84views Biometrics» more  HICSS 2008»
13 years 11 months ago
Electricity Load and Carbon Dioxide Emissions: Effects of a Carbon Price in the Short Term
Adam Newcomer, Seth Blumsack, Jay Apt, Lester B. L...
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
13 years 11 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis