Sciweavers

HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
14 years 5 months ago
Can IT Help Government to Restore Public Trust?: Declining Public Trust and Potential Prospects of IT in the Public Sector
During the past four decades, public trust in governments has continued to diminish due to various administrative, political, socio-cultural, economic, and mass media causes. Focu...
M. Jae Moon
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 5 months ago
Beyond Mobile: Research Topics for upcoming Technologies in the Insurance Industry
This paper provides a first idea on changes induced by new ICT that goes ‘beyond mobile’. Main aspects considered are value creation structures, value proposition of products ...
Christian D. Müller, Hans-Dieter Zimmermann
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 5 months ago
Politeness Theory and Computer-Mediated Communication: A Sociolinguistic Approach to Analyzing Relational Messages
This conceptual paper suggests how Politeness Theory [6] – well known in anthropological and linguistic literatures – can contribute to the study of role relations in computer...
David A. Morand, Rosalie J. Ocker
HICSS
2003
IEEE
62views Biometrics» more  HICSS 2003»
14 years 5 months ago
A Study on the Impacts of Verbal Interaction in Proximate GSS Sessions
Although distributed Group Support Systems (GSS) are getting popular, there are still some limitations. One of the limitations is few substitutions for face-to-face (FTF) interact...
Tsuneki Mukahi, Gail Corbitt
HICSS
2003
IEEE
132views Biometrics» more  HICSS 2003»
14 years 5 months ago
Markets for Reliability and Financial Options in Electricity: Theory to Support the Practice
The underlying structure of why and how consumers value reliability of electric service is explored, together with the technological options and cost characteristics for the provi...
Timothy Mount, William Schulze, Richard E. Schuler
HICSS
2003
IEEE
93views Biometrics» more  HICSS 2003»
14 years 5 months ago
Performance of Bluetooth Bridges in Scatternets With Exhaustive Service Scheduling
— The performance of two Bluetooth piconets linked through a bridge device is analyzed using the tools of queueing theory. We analyze both the Master/Slave (MS) and Slave/Slave (...
Jelena V. Misic, Vojislav B. Misic
HICSS
2003
IEEE
174views Biometrics» more  HICSS 2003»
14 years 5 months ago
Semantic Interoperability in the Fixed Income Securities Industry: A Knowledge Representation Architecture for Dynamic Integrati
We examine a knowledge representation architecture to support context interchange mediation. For autonomous receivers and sources sharing a common subject domain, the mediator’s...
Allen Moulton, Stuart E. Madnick, Michael Siegel
HICSS
2003
IEEE
109views Biometrics» more  HICSS 2003»
14 years 5 months ago
The 'Vanishing' IT Productivity: A Simple Theory
The perceived phenomenon that huge investments in information technology (IT) over the past four decades have yielded a very small gain in productivity has been dubbed the “IT p...
Effy Oz
HICSS
2003
IEEE
111views Biometrics» more  HICSS 2003»
14 years 5 months ago
Evaluating Support for Improvisation in Simulated Emergency Scenarios
Technological systems involving hazards are typically managed by experienced personnel guided by wellformulated, pre-determined procedures. These procedures are designed to ensure...
David Mendonça, Giampiero E. G. Beroggi, Wi...
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
14 years 5 months ago
Towards Verifying Parametrised Hardware Libraries with Relative Placement Information
Abstract— This paper presents a framework for verifying compilation tools for parametrised hardware libraries with placement information. Such libraries are captured in Pebble, a...
Steve McKeever, Wayne Luk, Arran Derbyshire