Sciweavers

HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
13 years 10 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
13 years 10 months ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
HICSS
2009
IEEE
159views Biometrics» more  HICSS 2009»
13 years 10 months ago
Collaborative Modeling - A Design Science Approach
We have used a design science approach to study the collaborative creation of conceptual models. We have designed a collaborative modeling architecture based on business needs and...
Peter Rittgen
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
13 years 10 months ago
Ontological Support for Managing Non-Functional Requirements In Pervasive Healthcare
We designed and implemented an ontological solution which makes provisions for choosing adequate devices/sensors for remote monitoring of patients who are suffering from post-stro...
Nigel Koay, Pavandeep Kataria, Radmila Juric, Patr...
HICSS
2009
IEEE
190views Biometrics» more  HICSS 2009»
13 years 10 months ago
Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis
This paper describes the issues and challenges for real-time knowledge discovery and then discusses approaches and challenges for real-time data mining and stream mining. Our goal...
Bhavani M. Thuraisingham, Latifur Khan, Murat Kant...
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
13 years 10 months ago
GrayWulf: Scalable Clustered Architecture for Data Intensive Computing
Alexander S. Szalay, Gordon Bell, Jan vandenBerg, ...
HICSS
2009
IEEE
120views Biometrics» more  HICSS 2009»
13 years 10 months ago
Trapping Malicious Insiders in the SPDR Web
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
HICSS
2009
IEEE
88views Biometrics» more  HICSS 2009»
13 years 10 months ago
Exploration of Cultural Influences on Business and IT Alignment
Aligning IT to business needs is still one of the most important concerns for senior management. The message of Business and IT Alignment (BIA) is logical and undisputed, but impl...
A. J. Gilbert Silvius, Steven De Haes, Wim Van Gre...
HICSS
2009
IEEE
184views Biometrics» more  HICSS 2009»
13 years 10 months ago
Why Mobile Payments Fail? Towards a Dynamic and Multi-Perspective Explanation
Despite optimistic expectations fast diffusion of mobile payments has not taken place after a decade of trials. Several explanations to this situation have been put forward using ...
Jan Ondrus, Kalle Lyytinen, Yves Pigneur
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
13 years 10 months ago
Bridge Methods: Using a Balanced Project Practice Portfolio to Integrate Agile and Formal Process Methodologies
This paper examines the non-linear nature of progress on software projects. It asserts that this uneven accomplishment stems from the continuous need to drive value quickly in res...
Stephen J. Cohen, William H. Money