Sciweavers

HICSS
2010
IEEE
173views Biometrics» more  HICSS 2010»
13 years 11 months ago
Analysis of Stakeholder/Value Dependency Patterns and Process Implications: A Controlled Experiment
Different classes of information system stakeholders depend on different values to be successful. Understanding stakeholders’ value dependencies is critical for developing softw...
Di Wu, Qi Li, Mei He, Barry W. Boehm, Ye Yang, Sup...
HICSS
2010
IEEE
196views Biometrics» more  HICSS 2010»
13 years 11 months ago
Combining Phasor Measurements to Monitor Cutset Angles
Power systems under stress can show large voltage angle differences between areas that can be monitored by wide area phasor measurements. One way to make this idea more specific ...
Ian Dobson, Manu Parashar, Chelsea Carter
HICSS
2010
IEEE
224views Biometrics» more  HICSS 2010»
13 years 11 months ago
Finding Success in Rapid Collaborative Requirements Negotiation Using Wiki and Shaper
Defining requirements without satisfying success critical stakeholders often leads to expensive project failures. Enabling interdisciplinary stakeholders to rapidly and effectivel...
Di Wu, Da Yang, Barry W. Boehm
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
13 years 11 months ago
Integrating Non-Storable Renewable Energy into the Australian Electricity Industry
This paper presents a framework for analyzing and designing decision-making in the context of an electricity industry or, more broadly, a stationary energy sector. It uses that fr...
Hugh Outhred, Stuart Thorncraft
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
13 years 11 months ago
Online and Offline Social Networks: Investigating Culturally-Specific Behavior and Satisfaction
Research shows that people from different cultural backgrounds and gender roles behave and communicate in systematically different ways. The current research utilized a survey (N=...
Devan Rosen, Michael Stefanone, Derek Lackaff
HICSS
2010
IEEE
157views Biometrics» more  HICSS 2010»
13 years 11 months ago
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat again...
Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yar...
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
13 years 11 months ago
Designing Sensor-Based Event Processing Infrastructures
  Systems for distributed event processing have recently gained  increasing attention in a broad range of application domains. This raises  the demand for me...
Agnès Voisard, Holger Ziekow
HICSS
2010
IEEE
170views Biometrics» more  HICSS 2010»
13 years 11 months ago
Artifacts as Instant Messaging Buddies
Interpersonal awareness is one person’s up-to-the moment knowledge about other group members, while artifact awareness is one person’s up-to-the-moment knowledge about other g...
Saul Greenberg, Stephen Voida, Nathan Stehr, Kimbe...
HICSS
2010
IEEE
157views Biometrics» more  HICSS 2010»
13 years 11 months ago
Tag Clusters as Information Retrieval Interfaces
The paper presents our design of a next generation information retrieval system based on tag co-occurrences and subsequent clustering. We help users getting access to digital data...
Kathrin Knautz, Simone Soubusta, Wolfgang G. Stock