Sciweavers

HICSS
2009
IEEE
96views Biometrics» more  HICSS 2009»
14 years 6 months ago
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines
Much recent work has focused on the process of auditing the results of elections. Little work has focused on auditing the e-voting systems currently in use. The facilities for doi...
Sean Peisert, Matt Bishop, Alec Yasinsac
HICSS
2009
IEEE
127views Biometrics» more  HICSS 2009»
14 years 6 months ago
Design Rules for User-Oriented IT Service Descriptions
Customers of complex IT-services increasingly demand integrated value bundles that fit their individual needs. At the same time, IT service providers are facing commoditization of...
Henrik Brocke, Thorsten Hau, Alexander Vogedes, Be...
HICSS
2009
IEEE
87views Biometrics» more  HICSS 2009»
14 years 6 months ago
Semantics-Driven Development for Electronic Government Applications
It has been argued that the challenges in electronic government are purely social: that existing methods and tools are perfectly adequate, and that electronic government projects ...
Charles Crichton, Jim Davies, Jeremy Gibbons, Stev...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 6 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
14 years 6 months ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
HICSS
2009
IEEE
159views Biometrics» more  HICSS 2009»
14 years 6 months ago
Collaborative Modeling - A Design Science Approach
We have used a design science approach to study the collaborative creation of conceptual models. We have designed a collaborative modeling architecture based on business needs and...
Peter Rittgen
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
14 years 6 months ago
Ontological Support for Managing Non-Functional Requirements In Pervasive Healthcare
We designed and implemented an ontological solution which makes provisions for choosing adequate devices/sensors for remote monitoring of patients who are suffering from post-stro...
Nigel Koay, Pavandeep Kataria, Radmila Juric, Patr...
HICSS
2009
IEEE
190views Biometrics» more  HICSS 2009»
14 years 6 months ago
Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis
This paper describes the issues and challenges for real-time knowledge discovery and then discusses approaches and challenges for real-time data mining and stream mining. Our goal...
Bhavani M. Thuraisingham, Latifur Khan, Murat Kant...
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
14 years 6 months ago
GrayWulf: Scalable Clustered Architecture for Data Intensive Computing
Alexander S. Szalay, Gordon Bell, Jan vandenBerg, ...
HICSS
2009
IEEE
120views Biometrics» more  HICSS 2009»
14 years 6 months ago
Trapping Malicious Insiders in the SPDR Web
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...