Sciweavers

2614 search results - page 450 / 523
» Information System Architectures: From Art to Science
Sort
View
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 2 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
GECCO
2007
Springer
258views Optimization» more  GECCO 2007»
14 years 2 months ago
A genetic algorithm for resident physician scheduling problem
This paper formally presents the resident physician scheduling problem, which is one of the most important scheduling problems in hospital. The resident physician scheduling probl...
Chi-Way Wang, Lei-Ming Sun, Ming-Hui Jin, Chung-Ju...
GECCO
2007
Springer
167views Optimization» more  GECCO 2007»
14 years 2 months ago
Evolution of adult male oral tract shapes for close and open vowels
In this paper, we describe an experiment to evolve oral tract (mouth) shapes for a set of vowels for two adult males. Target vowels were recorded in an acoustically anechoic room ...
David M. Howard, Andy M. Tyrrell, Crispin H. V. Co...
HICSS
2006
IEEE
135views Biometrics» more  HICSS 2006»
14 years 1 months ago
Optimizing an IT Project Portfolio with Time-Wise Interdependencies
Little research has examined the relevance of real options for valuation of information technology (IT) investments for prioritizing a portfolio of projects. When the effect of pr...
Indranil R. Bardhan, Robert J. Kauffman, Sanjeewa ...
HICSS
2006
IEEE
174views Biometrics» more  HICSS 2006»
14 years 1 months ago
CrystalChat: Visualizing Personal Chat History
As more people take part in online conversations, awareness of the varying conversational styles and social mores afforded by different software is growing. However, this awarenes...
Annie Tat, M. Sheelagh T. Carpendale