Sciweavers

HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
13 years 11 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
HICSS
2010
IEEE
210views Biometrics» more  HICSS 2010»
13 years 11 months ago
The Effects of Linguistic Features and Evaluation Perspective on Perceived Difficulty of Medical Text
Millions of laypersons need more medical information than they are customarily provided during their doctor’s visit. Health websites can help fill this knowledge gap, but the te...
Gondy Leroy, Stephen Helmreich, James R. Cowie
HICSS
2010
IEEE
159views Biometrics» more  HICSS 2010»
13 years 11 months ago
Towards a Systematic Approach for Capturing Dynamic Transformation in Enterprise Models
The transparency created by enterprise models is a valuable support for organizational engineering and especially enterprise transformation. However, current approaches are hardly...
Stephan Aier, Bettina Gleichauf
HICSS
2010
IEEE
182views Biometrics» more  HICSS 2010»
13 years 11 months ago
Analyzing Leadership Dynamics in Distributed Group Communication
—We apply social network analysis (SNA) to examine the dynamics of leadership in distributed groups, specifically Free/Libre Open Source Software development projects, and its r...
Kevin Crowston, Andrea Wiggins, James Howison
HICSS
2010
IEEE
487views Biometrics» more  HICSS 2010»
13 years 11 months ago
A Survey of Game Theory as Applied to Network Security
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...
HICSS
2010
IEEE
205views Biometrics» more  HICSS 2010»
13 years 11 months ago
Loadable Hypervisor Modules
The topic of virtualization has received renewed attention. Xen is a popular open source type-I hypervisor. The Xen hypervisor currently has limited capabilities for runtime modi...
Thomas Naughton, Geoffroy Vallée, Stephen L...
HICSS
2010
IEEE
162views Biometrics» more  HICSS 2010»
13 years 11 months ago
Risk-Based Decision Support in Service Value Networks
The current trend towards dynamic and highly scalable service provisioning fosters the rise of Software as a Service (SaaS) platforms and so called Compute Clouds. The on-demand p...
Wibke Michalk, Benjamin Blau, Jochen Stö&szli...
HICSS
2010
IEEE
235views Biometrics» more  HICSS 2010»
13 years 11 months ago
Knowledge Sourcing from Repositories: The Role of System Characteristics and Autonomy
Organizations invest in the development of knowledge repositories (KR) to foster knowledge reuse and integration. Yet many KR initiatives fail to meet expectations, in part becaus...
Alexandra Durcikova, Kelly J. Fadel
HICSS
2010
IEEE
208views Biometrics» more  HICSS 2010»
13 years 11 months ago
Using Personality Factors to Predict Interface Learning Performance
This current study explored the impact of individual differences in personality factors on interface interaction and learning performance in both an interactive visualization and ...
Tera Marie Green, Dong Hyun Jeong, Brian Fisher
HICSS
2010
IEEE
162views Biometrics» more  HICSS 2010»
13 years 11 months ago
A Cyberinfrastructure Framework for Comparative Effectiveness Research in Healthcare
Omar F. El-Gayar, Surendra Sarnikar, Matthew J. Wi...