Sciweavers

HICSS
1999
IEEE
137views Biometrics» more  HICSS 1999»
13 years 11 months ago
A Methodology for Evaluating and Selecting Data Mining Software
As data mining evolves and matures more and more businesses are incorporating this technology into their business practices. However, currently data mining and decision support so...
Ken W. Collier, Donald Sautter, Curt Marjaniemi, B...
HICSS
1999
IEEE
193views Biometrics» more  HICSS 1999»
13 years 11 months ago
Web-based Access to Distributed High-Performance Geographic Information Systems for Decision Support
A number of applications that use GIS for decision support can potentially be enhanced by the use of high-performance computers, broadband networks and mass data stores. We descri...
Paul D. Coddington, Kenneth A. Hawick, Heath A. Ja...
HICSS
1999
IEEE
97views Biometrics» more  HICSS 1999»
13 years 11 months ago
The Ragnarok Architectural Software Configuration Management Model
The architecture is the fundamental framework for designing and implementing large scale software, and the ability to trace and control its evolution is essential. However, many t...
Henrik Bærbak Christensen
HICSS
1999
IEEE
113views Biometrics» more  HICSS 1999»
13 years 11 months ago
Analyzing Firm-Level Strategy for Internet-Focused Reintermediation
Alina M. Chircu, Robert J. Kauffman
HICSS
1999
IEEE
98views Biometrics» more  HICSS 1999»
13 years 11 months ago
Integrating Spatial, Semantic, and Social Structures for Knowledge Management
In this paper we describe a unique type of knowledge management systems virtual reality-enabled multi-user virtual environments with spatialised semantic structures. They are des...
Chaomei Chen, John Davies
HICSS
1999
IEEE
97views Biometrics» more  HICSS 1999»
13 years 11 months ago
Five Reasons for Scenario-based Design
Scenarios of human-computer interaction help us to understand and to create computer systems and applications as artifacts of human activity
John M. Carroll
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
13 years 11 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
HICSS
1999
IEEE
82views Biometrics» more  HICSS 1999»
13 years 11 months ago
Identifying the Workflow Potential of Business Processes
Though the activities of business organizations in the field of workflow management are facing an enormous growth, a methodical solution for an essential problem occurring in many...
Jörg Becker, Christoph von Uthmann, Michael z...
HICSS
1999
IEEE
81views Biometrics» more  HICSS 1999»
13 years 11 months ago
Managing the Risk of IT Outsourcing
Benoit Aubert, Sylvie Dussault, Michel Patry, Suza...
HICSS
1999
IEEE
114views Biometrics» more  HICSS 1999»
13 years 11 months ago
On the Analysis of Regulations using Defeasible Rules
Regulations are a wide-spread and important part of governmentand business. Theycodify howproducts must be madeand processes should be performed. Suchregulations can be difficult ...
Grigoris Antoniou, David Billington, Michael J. Ma...