Sciweavers

235 search results - page 44 / 47
» hicss 2006
Sort
View
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 3 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
HICSS
2006
IEEE
77views Biometrics» more  HICSS 2006»
15 years 3 months ago
System-Wide Replacement Strategy for Substation Protection and Automation Systems
The protection and control systems in the US utility industry are still primarily composed of electromechanical relays and systems. Over 80 percent of the relays are still electro...
Paul T. Myrda, Eric A. Udren
HICSS
2006
IEEE
96views Biometrics» more  HICSS 2006»
15 years 3 months ago
Is Information Systems a Reference Discipline?
In recent times, there has been a growing interest in the level of intellectual contribution that IS makes to other disciplines. Much of the debate that has dominated the literatu...
Sridhar P. Nerur, RadhaKanta Mahapatra, Venugopal ...
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Effect of Group Support Systems on the Emergence of Unique Information in a Risk Management Process: A Field Study
The management of operational risks, i.e., risks of loss resulting from inadequate or failed processes, people and systems or from external events, is crucial for the stability of...
Anne-Françoise Rutkowski, Bartel Van de Wal...
HICSS
2006
IEEE
93views Biometrics» more  HICSS 2006»
15 years 3 months ago
Use of SMS in Office Environments
Investigations of Short Messaging System (SMS) or texting have been directed at private use and mostly the adolescent population. The present paper investigates SMS in a represent...
Gunnvald B. Svendsen, Bente Evjemo, Jan-Are K. Joh...