Sciweavers

HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 13 hour ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
HICSS
2009
IEEE
146views Biometrics» more  HICSS 2009»
14 years 13 hour ago
A Dissemination Protocol to Guarantee Data Accessibility within N-Hops for Wireless Sensor Networks
One of the major challenges of designing a dissemination protocol for Wireless Sensor Networks (WSNs) is energy efficiency. Flooding and SPIN, which are very well-known proactive ...
Moonseong Kim, Matt W. Mutka, Sang-Hun Cho, Hyunse...
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
14 years 13 hour ago
Using Collaborative Filtering Algorithms as eLearning Tools
Collaborative information filtering techniques play a key role in many Web 2.0 applications. While they are currently mainly used for business purposes such as product recommendat...
Frank Loll, Niels Pinkwart
HICSS
2009
IEEE
131views Biometrics» more  HICSS 2009»
14 years 13 hour ago
Challenges in Software Product Line Composition
The idea to develop applications and infrastructure software as software product lines (SPLs) is continuously growing in acceptance throughout the software industry. The ability t...
Horst Schirmeier, Olaf Spinczyk
HICSS
2009
IEEE
135views Biometrics» more  HICSS 2009»
14 years 13 hour ago
The Role of Social Capital in the Creation of Community Wireless Networks
Community wireless networks (CWNs) offer free or affordable Internet access for the purpose of improving the well-being of the community. Many questions have been raised about the...
Abdelnasser Abdelaal, Hesham H. Ali, Deepak Khazan...
HICSS
2009
IEEE
85views Biometrics» more  HICSS 2009»
14 years 13 hour ago
Bounding the Size of k-Tuple Covers
Suppose there are n applications and n processors. A pair cover is a set S of one-to-one mappings (assignments) of the applications to the processors such that, for every pair (Ai...
Wolfgang W. Bein, Shahram Latifi, Linda Morales, I...
HICSS
2009
IEEE
155views Biometrics» more  HICSS 2009»
14 years 13 hour ago
Collaborative Recommender Systems for Building Automation
Building Automation Systems (BASs) can save building owners money by reducing energy consumption while simultaneously preserving occupant comfort. There are algorithms that optimi...
Michael LeMay, Jason J. Haas, Carl A. Gunter
HICSS
2009
IEEE
83views Biometrics» more  HICSS 2009»
14 years 13 hour ago
Music Collectivities and MySpace: Towards Digital Collectives
Music collectivities have been changed by the use  of   digital   technologies   in   terms   of   more   flexibility  among participants. This claim is so w...
Camilla Rossi, Maurizio Teli
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
14 years 13 hour ago
Using Graphics Processors for Parallelizing Hash-Based Data Carving
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensic...
Sylvain Collange, Yoginder S. Dandass, Marc Daumas...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 13 hour ago
Mycrocosm: Visual Microblogging
This paper introduces Mycrocosm, a microblogging site in which users communicate via statistical graphics, rather than the usual short text statements. Users of Mycrocosm can reco...
Yannick Assogba, Judith S. Donath