Sciweavers

HICSS
2008
IEEE
142views Biometrics» more  HICSS 2008»
14 years 17 days ago
K-Trunk and Efficient Algorithms for Finding a K-Trunk on a Tree Network
Given an edge-weighted tree T, a k-trunk is a subtree Tk with k leaves in T which minimizes the sum of the distances of all vertices in T from Tk plus the weight of Tk. In this pa...
Yamin Li, Shietung Peng, Wanming Chu
HICSS
2008
IEEE
127views Biometrics» more  HICSS 2008»
14 years 17 days ago
A Dyadic Model of Interorganizational Systems (IOS) Adoption Maturity
Interorganizational Systems (IOS) adoption requires cooperation and collaboration between trading partners and, therefore, is reliant on the nature of their relationships. There h...
Mazen Ali, Sherah Kurnia, Robert B. Johnston
HICSS
2008
IEEE
135views Biometrics» more  HICSS 2008»
14 years 17 days ago
From Adoption to Diffusion of a Telehealth Innovation
Telehealth innovations promise to provide extensive medical benefits by increasing access to healthcare services and lowering costs at the same time. However, while many telehealt...
Sunyoung Cho, Lars Mathiassen, Michael Gallivan
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
14 years 17 days ago
Evaluating the Effect of Upgrade, Control and Development Strategies on Robustness and Failure Risk of the Power Transmission Gr
We use the OPA complex systems model of the power transmission system to investigate the effect of a series of different network upgrade scenarios on the long time dynamics and th...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
14 years 17 days ago
Integrating Conflicting Reviews: Attributional Hypotheses of Consumer Response to Information Uncertainty depending on Prior Bra
This study investigates how consumers evaluate a product when they read conflicting online consumer reviews of evaluations from previous consumers. If consumers are rational, as i...
Do-Hyung Park, Ingoo Han
HICSS
2008
IEEE
153views Biometrics» more  HICSS 2008»
14 years 17 days ago
Fault-Tolerant k-Fold Pivot Routing in Wireless Sensor Networks
Selecting a small set of nodes called pivots, from all the nodes in a network and maintaining the routing infrastructure to and among each other can reduce routing overhead and ex...
Doina Bein
HICSS
2008
IEEE
215views Biometrics» more  HICSS 2008»
14 years 1 months ago
Harry Potter and the Meat-Filled Freezer: A Case Study of Spontaneous Usage of Visualization Tools
This paper is a report on early user activity in Many Eyes, a public web site where users may upload data, create visualizations, and carry on discussions. Since the site launched...
Fernanda B. Viégas, Martin Wattenberg, Matt...
HICSS
2008
IEEE
156views Biometrics» more  HICSS 2008»
14 years 7 months ago
Knowledge States: A Tool for Randomized Online Algorithms
Wolfgang W. Bein, Lawrence L. Larmore, Rüdige...
HICSS
2008
IEEE
199views Biometrics» more  HICSS 2008»
14 years 7 months ago
Clustering and the Biclique Partition Problem
A technique for clustering data by common attribute values involves grouping rows and columns of a binary matrix to make the minimum number of submatrices all 1’s. As binary mat...
Doina Bein, Linda Morales, Wolfgang W. Bein, C. O....
HICSS
2008
IEEE
152views Biometrics» more  HICSS 2008»
14 years 7 months ago
A Context-Aware Approach Enhancing XML Semantics Integration
XML is designed to facilitate data exchange between applications. However, XML and its schema languages do not express semantics but rather the document structure, such as the nes...
Dershing Luo, Ching-Cha Hsieh