Sciweavers

HICSS
2005
IEEE
93views Biometrics» more  HICSS 2005»
14 years 1 months ago
Service Composition on Top of Exchangable Protocols
Whenever message-oriented middleware is used within applications which run on heterogeneous software systems of multiple partners, and middleware protocols have to be replaced or ...
Stefan Böttcher, Christian Dannewitz
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
14 years 1 months ago
Enterprise Architecture Analysis with XML
This paper shows how XML can be used for static and dynamic analysis of architectures. Our analysis is based on the distinction between symbolic and semantic models of architectur...
Frank S. de Boer, Marcello M. Bonsangue, Joost Jac...
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
14 years 1 months ago
Virtual Organizations as Normative Multiagent Systems
In this paper we propose a conceptual model of virtual organizations as normative multiagent systems. The dynamic aspects of virtual organizations are modeled using aspects of spe...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
14 years 1 months ago
The Move to Artist-Led Online Music Distribution: Explaining Structural Changes in the Digital Music Market
We propose a model for understanding the transformation of the market structure in the recorded music industry value chain due to new forms of digital distribution. It takes into a...
Jesse Bockstedt, Robert J. Kauffman, Frederick J. ...
HICSS
2005
IEEE
88views Biometrics» more  HICSS 2005»
14 years 1 months ago
The EWD-P System: Polish Government - Council of the European Union Interoperability Achieved
The Polish government – Council of the European Union interoperability is an important factor of the Europe enlargement success. This article presents how the interoperability h...
Grzegorz Blizniuk, Mariusz Momotko, Bartosz Nowick...
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
14 years 1 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
HICSS
2005
IEEE
329views Biometrics» more  HICSS 2005»
14 years 1 months ago
A Framework for Evaluating Strategic Location-Based Applications in Businesses
Location-based and location-oriented applications will be amongst the most powerful drivers of organizational change in the coming years. However, the strategic use of these techn...
François Bergeron, Lin Gingras, Pierre Hada...
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
14 years 1 months ago
Bounded in Cyberspace: An Empirical Model of Self-Regulation in Virtual Communities
This article aims to focus on self-regulation mechanisms that are exercised by virtual communities in order to maintain their boundaries of autonomy while directing behavior of th...
Karine Barzilai-Nahon, Seev Neumann
HICSS
2005
IEEE
175views Biometrics» more  HICSS 2005»
14 years 1 months ago
Creating Value from Digital Content: eBusiness Model Evolution in Online News and Music
The past two years have been a turbulent time for the New Economy generally – and for the digital content industry in particular. In the wake of the dot.com and telecoms crashes...
Kornelia van der Beek, Paula M. C. Swatman, Cornel...
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
14 years 1 months ago
A Systems Model for Knowledge Management: A Rhetorical Heuristic Process
An Integrative Mental Model of Knowledge Management can provide a way of visualizing the interrelated elements that comprise a knowledge management system. This original model, bu...
Charles E. Beck, Gary R. Schornack