Sciweavers

Share
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
8 years 10 months ago
Synthesizing Evocative Imagery through Design Patterns
Automatically creating images that give a sense of content can be useful in a number of settings. Such images can summarize a larger collection of media in novel ways, giving an e...
Daniel M. Russell, Andreas Dieberger
HICSS
2003
IEEE
177views Biometrics» more  HICSS 2003»
8 years 10 months ago
Is the Applicability of Web-Based Surveys for Academic Research Limited to the Field of Information Technology?
Currently, the Internet provides researchers with the opportunity to conduct online surveys in a more efficient and effective way than was previously allowed by traditional means....
Narcyz Roztocki, Nawal Ait Lahri
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
8 years 10 months ago
Message Sense Maker: Engineering a Tool Set for Customer Relationship Management
To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages m...
Dmitri Roussinov, J. Leon Zhao
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
8 years 10 months ago
Omnisphere: a Personal Communication Environment
Small ubiquitous devices connected by wireless networks will become future Internet appliances. To support them, communication networks must evolve to seamlessly assist appliances...
Franck Rousseau, Justinian Oprescu, Laurentiu-Sori...
HICSS
2003
IEEE
109views Biometrics» more  HICSS 2003»
8 years 10 months ago
Towards a Structurational Theory of Information Systems: A Substantive Case Analysis
This paper employs the analysis of an interpretive case study within a Regional Train Operating Company (RTOC) to arrive at theoretical understandings of Information Systems (IS)....
Jeremy Rose, Ray Hackney
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
8 years 10 months ago
Impact of Technology Sustainability on Healthcare Governance
Healthcare technology investments must be borne by charity, government subsidy, or patient reimbursement. Such investments can be expensive and require partnerships of public and ...
Thomas Lee Rodgers, Evan E. Anderson, Ming Yuan, T...
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
8 years 10 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
HICSS
2003
IEEE
179views Biometrics» more  HICSS 2003»
8 years 10 months ago
A QoS Metamodel and its Realization in a CORBA Component Infrastructure
This paper presents a generic model driven approach to enable Quality of Service (QoS) modeling and realization for component based middleware platforms. We describe a QoS metamod...
Tom Ritter, Marc Born, Thomas Unterschütz, To...
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
8 years 10 months ago
On the Limits of Bottom-Up Computer Simulation: Towards a Nonlinear Modeling Culture
1 In the complexity and simulation communities there is growing support for the use of bottom-up computer-based simulation in the analysis of complex systems. The presumption is th...
Kurt A. Richardson
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
8 years 10 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
books