Sciweavers

HICSS
2009
IEEE
135views Biometrics» more  HICSS 2009»
14 years 1 months ago
The Role of Social Capital in the Creation of Community Wireless Networks
Community wireless networks (CWNs) offer free or affordable Internet access for the purpose of improving the well-being of the community. Many questions have been raised about the...
Abdelnasser Abdelaal, Hesham H. Ali, Deepak Khazan...
HICSS
2009
IEEE
85views Biometrics» more  HICSS 2009»
14 years 1 months ago
Bounding the Size of k-Tuple Covers
Suppose there are n applications and n processors. A pair cover is a set S of one-to-one mappings (assignments) of the applications to the processors such that, for every pair (Ai...
Wolfgang W. Bein, Shahram Latifi, Linda Morales, I...
HICSS
2009
IEEE
155views Biometrics» more  HICSS 2009»
14 years 1 months ago
Collaborative Recommender Systems for Building Automation
Building Automation Systems (BASs) can save building owners money by reducing energy consumption while simultaneously preserving occupant comfort. There are algorithms that optimi...
Michael LeMay, Jason J. Haas, Carl A. Gunter
HICSS
2009
IEEE
83views Biometrics» more  HICSS 2009»
14 years 1 months ago
Music Collectivities and MySpace: Towards Digital Collectives
Music collectivities have been changed by the use  of   digital   technologies   in   terms   of   more   flexibility  among participants. This claim is so w...
Camilla Rossi, Maurizio Teli
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
14 years 1 months ago
Using Graphics Processors for Parallelizing Hash-Based Data Carving
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensic...
Sylvain Collange, Yoginder S. Dandass, Marc Daumas...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 1 months ago
Mycrocosm: Visual Microblogging
This paper introduces Mycrocosm, a microblogging site in which users communicate via statistical graphics, rather than the usual short text statements. Users of Mycrocosm can reco...
Yannick Assogba, Judith S. Donath
HICSS
2009
IEEE
127views Biometrics» more  HICSS 2009»
14 years 1 months ago
A Conceptual and Operational Definition of 'Social Role' in Online Community
Both online and off, people frequently perform particular social roles. These roles organize behavior and give structure to positions in local networks. As more of social life bec...
Eric Gleave, Howard T. Welser, Thomas M. Lento, Ma...
HICSS
2009
IEEE
147views Biometrics» more  HICSS 2009»
14 years 1 months ago
Determining a Firm's Optimal Outsourcing Rate: A Learning Model Perspective
We present a decision model of a firm’s optimal outsourcing rate as an extension of Cha et. al [1]’s previous work on the economic risk of knowledge loss and deskilling in the...
Hoon S. Cha, David E. Pingry, Matt E. Thatcher
HICSS
2009
IEEE
177views Biometrics» more  HICSS 2009»
14 years 1 months ago
Intelligent Alarm Processing: From Data Intensive to Information Rich
The requirement for power system operators to respond more efficiently to the stressed power system conditions that may create large number of alarms asks fort advanced alarm proc...
Mladen Kezunovic, Yufan Guan
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 1 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin