Sciweavers

HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
14 years 5 months ago
Ambiguities in Sketch-Based Interfaces
Sketch-based interaction is an intuitive, simple communication method. However, it has several critical aspects, due to difficulties during the interpretation step by the computer...
Danilo Avola, Maria Chiara Caschera, Fernando Ferr...
HICSS
2007
IEEE
130views Biometrics» more  HICSS 2007»
14 years 5 months ago
Analysis of Activity in the Open Source Software Development Community
— Open Source Software is computer software for which the source code is publicly open for inspection, modification, and redistribution. While research of a few, large, successf...
Scott Christley, Gregory R. Madey
HICSS
2007
IEEE
134views Biometrics» more  HICSS 2007»
14 years 5 months ago
Arriclides: An Architecture Integrating Clinical Decision Support Models
In this paper, we present an open architecture that enables the coexistence of and the collaboration between different and heterogeneous clinical decision support models. Clinical...
Kris Verlaenen, Wouter Joosen, Pierre Verbaeten
HICSS
2007
IEEE
133views Biometrics» more  HICSS 2007»
14 years 5 months ago
The Co-evolution of Design and User Requirements in Knowledge Management Systems: The Case of Patent Management Systems
Do the design requirements of a knowledge management system change over time? If so, how do these changes affect the users of the system? In this paper we explore the case of pate...
Tony Briggs, Bala Iyer, Paul Carlile
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
14 years 5 months ago
Tendering Process Model (TPM) Implementation for B2B Integration in a Web Services Environment
Improvements can be made for tendering processes to solve B2B interoperability and integration problem by means of Web services technology. In this paper, we detail our tendering ...
Lick Lun Nick Ng, Dickson K. W. Chiu, Patrick C. K...
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
14 years 5 months ago
Secure Software Engineering: A New Paradigm
Software defects lead to security vulnerabilities, which are costing businesses millions of dollars each year and threaten the security of individuals and the nation. It can be de...
Wm. Arthur Conklin, Glenn B. Dietrich
HICSS
2007
IEEE
98views Biometrics» more  HICSS 2007»
14 years 5 months ago
An Outcome-Based Learning Model to Identify Emerging Threats: Experimental and Simulation Results
The authors present experimental and simulation results of an outcome-based learning model as it applies to the identification of emerging threats. This model integrates judgment,...
Ignacio J. Martinez-Moyano, Stephen H. Conrad, Dav...
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
14 years 5 months ago
The Future of Work: What Does Online Community Have to Do with It?
Amidst constant innovation in information and communication technologies, a new pattern of work is emerging. Hierarchical authority structures are giving way to greater decision-m...
Dejin Zhao, Mary Beth Rosson, Sandeep Purao
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 5 months ago
Courier Assignment in Social Networks
Integration is important in politics, business, and technology. In all these fields, the definition of integration is vague. We build a formal measure of integration based on the ...
Jeffrey V. Nickerson, Stephan Olariu
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
14 years 5 months ago
Making Sense of Stories: the development of a new mobile computer game
This paper analyzes the retrospective stories of a four person team responsible for developing a new computer game for mobile phones. Our theorizing is based on an in-depth, two y...
Patrick Stacey, Andrew Brown, Joe Nandhakumar