Sciweavers

HICSS
2011
IEEE
182views Biometrics» more  HICSS 2011»
12 years 8 months ago
The "S" in Social Network Games: Initiating, Maintaining, and Enhancing Relationships
Social network games embedded within social network sites (SNSs) such as Facebook facilitate play with “Friends” within the SNS. In this study, we look at different dimensions...
Donghee Yvette Wohn, Cliff Lampe, Rick Wash, Nicol...
HICSS
2011
IEEE
179views Biometrics» more  HICSS 2011»
12 years 8 months ago
EventGraphs: Charting Collections of Conference Connections
EventGraphs are social media network diagrams of conversations related to events, such as conferences. Many conferences now communicate a common “hashtag” or keyword to identi...
Derek L. Hansen, Marc A. Smith, Ben Shneiderman
HICSS
2011
IEEE
210views Biometrics» more  HICSS 2011»
12 years 8 months ago
Knowledge and Information Sharing in Transnational Knowledge Networks: A Contextual Perspective
As government agencies increasingly collaborate with international counterparts on critical global issues, transnational knowledge and information sharing grow in importance. This...
Sharon S. Dawes, Mohammed A. Gharawi, G. Brian Bur...
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 8 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
HICSS
2011
IEEE
222views Biometrics» more  HICSS 2011»
12 years 8 months ago
Democracy.com: A Tale of Political Blogs and Content
Karine Nahon, Jeff Hemsley
HICSS
2011
IEEE
157views Biometrics» more  HICSS 2011»
12 years 8 months ago
Reusing Relational Queries for Intuitive Decision Optimization
— Decision optimization is used in many applications such as those for finding the best course of action in emergencies. However, optimization solutions require considerable mat...
Alexander Brodsky, Nathan E. Egge, Xiaoyang Sean W...
HICSS
2011
IEEE
279views Biometrics» more  HICSS 2011»
12 years 8 months ago
A Rule-Based Natural Language Technique for Requirements Discovery and Classification in Open-Source Software Development Projec
Open source projects do have requirements; they are, however, mostly informal, text descriptions found in requests, forums, and other correspondence. Understanding of such require...
Radu Vlas, William N. Robinson
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
12 years 8 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
HICSS
2011
IEEE
208views Biometrics» more  HICSS 2011»
12 years 8 months ago
An Experimental Study of Financial Portfolio Selection with Visual Analytics for Decision Support
We investigate the decision process as applied to the practical task of choosing a financial portfolio. We developed PortfolioCompare, an interactive visual analytic decision sup...
Anya Savikhin, Hon Cheong Lam, Brian D. Fisher, Da...