Sciweavers

HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
14 years 1 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
14 years 1 months ago
Modeling the Economic Cost of Transmission Bottlenecks
— The purpose of this paper is to model the stochastic behavior of nodal prices and use the predicted price differences between zones as the basis for measuring the magnitude and...
Timothy D. Mount, Jaeuk Ju
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 1 months ago
Using Software Component Models and Services in Embedded Real-Time Systems
While the use of software component models has become popular in the development of desktop applications and distributed information systems, such models have not been widely used...
Frank Lüders, Shoaib Ahmad, Faisal Khizer, Gu...
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
14 years 1 months ago
Framework for Establishing Enterprise Modeling in the Context of Collaborative Enterprises
Increased market dynamics, shorter product lifecycles and a higher customer involvement in product design have caused great changes to competitive conditions and many companies ar...
Thomas Knothe, Timo Kahl, Dieter Boell, Kristof Sc...
HICSS
2007
IEEE
163views Biometrics» more  HICSS 2007»
14 years 1 months ago
On the Communication Architecture for Wide-Area Real-Time Monitoring in Power Networks
— Reliable and efficient operation of power networks is of paramount importance. In this paper we explore communication architectures that leverage Phasor Measurement Units (PMU...
Shrut Kirti, Zhifang Wang, Anna Scaglione, Robert ...
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
14 years 1 months ago
Master's Degree in Digital Forensics
Law enforcement agents at the local, state, and Federal levels have informed us of backlogs of computer-related crime cases ranging from 18 months to three years. The primary caus...
Philip Craiger, Lucille Ponte, Carrie Morgan Whitc...
HICSS
2007
IEEE
102views Biometrics» more  HICSS 2007»
14 years 1 months ago
Organizational Impacts of Cyber Security Provisions: A Sociotechnical Framework
In this paper, we outline a conceptual framework for linking cyber security provisions to business processes. The framework is presented for use in analyzing the cost and performa...
Anthony M. Cresswell, Shahidul Hassan
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 1 months ago
Distributed Knowledge Construction in an Online Community of Inquiry
This paper examines sustained, socially-situated engagement in online learning communities. We propose three levels of engagement that are examined through an empirical study of j...
James Waters, Susan Gasson
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 1 months ago
The Length of the Product Generation Life Cycle as a Moderator of Innovation Strategy: A Comparative Cross-Industry Study of Ten
This paper aims at exploring the role of the product generation life cycle (PGLC) on differences in innovation strategy among industries in a crossindustry study of ten multinatio...
Frances T. J. M. Fortuin, S. W. F. Omta