Sciweavers

HICSS
2009
IEEE
122views Biometrics» more  HICSS 2009»
14 years 2 months ago
Empirical Estimates and Observations of 0Day Vulnerabilities
We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. T...
Miles A. McQueen, Trevor A. McQueen, Wayne F. Boye...
HICSS
2009
IEEE
321views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Conceptual Model for Studying the Influence of Charismatic Leadership on ERP Implementation Lifecycle
In the context of ERP implementation, leadership is consistently found to be the most important factor leading to implementation success. However, most of the studies focus on lea...
Zhen Shao, Yuqiang Feng, Qing Hu, Yang Liu
HICSS
2009
IEEE
84views Biometrics» more  HICSS 2009»
14 years 2 months ago
Revising the Panko-Halverson Taxonomy of Spreadsheet Risks
The Panko–Halverson Taxonomy of Spreadsheet Risks has been widely used since its creation in the 1990s. This paper revises that taxonomy. It introduces new ways to count cell er...
Raymond R. Panko
HICSS
2009
IEEE
123views Biometrics» more  HICSS 2009»
14 years 2 months ago
Users' Influence on the Success of Online Communities
This paper examines how different facets of favorable user behavior drive the success of an online community by using a unique data set with surveys from 1,389 participants from t...
Jakob Assmann, Philipp Sandner, Sophie Ahrens
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
14 years 2 months ago
Designing an Intelligent Agent that Negotiates Tactfully with Human Counterparts: A Conceptual Analysis and Modeling Framework
Automated negotiation has attracted growing interest within fields such as e-business, multi-agent systems, and web services. Nevertheless, a majority of automated negotiation res...
Yinping Yang, Sharad Singhal
HICSS
2009
IEEE
118views Biometrics» more  HICSS 2009»
14 years 2 months ago
FXplorer: Exploration of Computed Software Behavior - A New Approach to Understanding and Verification
The craft of software understanding and verification can benefit from technologies that enable evolution toward a true engineering discipline. In current practice, software develo...
Luanne Burns, Timothy Daly
HICSS
2009
IEEE
125views Biometrics» more  HICSS 2009»
14 years 2 months ago
Conceptualizing Interpersonal Interruption Management: A Theoretical Framework and Research Program
Previous research exploring interpersonal-technologymediated interruptions has focused on understanding how the knowledge of an individual’s local context can be utilized to redu...
Sukeshini A. Grandhi, Quentin Jones
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Simple Model for the Reliability of an Infrastructure System Controlled by Agents
A simple dynamic model of agent operation of an infrastructure system is presented. This system evolves over a long time scale by a daily increase in consumer demand that raises t...
Benjamin A. Carreras, David E. Newman, Ian Dobson,...
HICSS
2009
IEEE
106views Biometrics» more  HICSS 2009»
14 years 2 months ago
Transmission Tariffs by Use of System and Economic Benefits
Setting electric transmission tariffs is a classical multi-objective problem. The tariff problem is particularly challenging in modern power markets where transmission has been se...
Daniel J. Cámac, Raúl C. Bastidas, W...
HICSS
2009
IEEE
103views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Thin Client Interface to a High Performance Multi-modal Image Analytics System
We describe a platform for performing text and radiology analytics (TARA). We integrate commercially available hardware and middleware components to construct an environment which...
James W. Cooper, Shahram Ebadollahi, Ellen Eide