Sciweavers

HICSS
2008
IEEE
143views Biometrics» more  HICSS 2008»
14 years 6 months ago
Bounding Prefix Transposition Distance for Strings and Permutations
A transposition is an operation that exchanges two adjacent substrings. When it is restricted so that one of the substrings is a prefix, it is called a prefix transposition. The p...
Bhadrachalam Chitturi, Ivan Hal Sudborough
HICSS
2008
IEEE
122views Biometrics» more  HICSS 2008»
14 years 6 months ago
A Meta-theory for Understanding IS in Socio-technical Systems
Information systems (IS) research often attempts to examine and explain how technology leads to outcomes through usage of information technology (IT). Although extensive research ...
Dominic M. Thomas, Saurabh Gupta, Robert P. Bostro...
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
14 years 6 months ago
The Economic Production Quantity Problem with a Finite Production Rate and Fuzzy Cycle Time
Managing the inventories along with carrying out the production program is essential for many companies in the producing industry. In this paper, a fuzzy EPQ (Economic Production ...
Kaj-Mikael Björk
HICSS
2008
IEEE
102views Biometrics» more  HICSS 2008»
14 years 6 months ago
Retrofitting Cyber Physical Systems for Survivability through External Coordination
Most Supervisory Control and Data Acquisition (SCADA) systems have been in operation for decades and they in general have 24x7 availability requirement, hence upgrading or adding ...
Kun Xiao, Shangping Ren, Kevin A. Kwiat
HICSS
2008
IEEE
141views Biometrics» more  HICSS 2008»
14 years 6 months ago
Online Services, Customer Characteristics and Usability Requirements
Designing web sites that are responsive to customer needs is a critical prerequisite for the success of online services. Recently, a usability evaluation procedure, based on the M...
Anne P. Massey, Vijay Khatri, Mitzi M. Montoya-Wei...
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
14 years 6 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
HICSS
2008
IEEE
128views Biometrics» more  HICSS 2008»
14 years 6 months ago
Communicators' Perceptions of Social Presence as a Function of Avatar Realism in Small Display Mobile Communication Devices
This study describes an experiment in which 126 participants engaged via a mobile telephone simulation that included a visual display in a discussion that required self-disclosure...
Sin-Hwa Kang, James H. Watt, Sasi Kanth Ala
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
14 years 6 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
14 years 6 months ago
Supporting Strategic Innovativeness: Scenario Planning for Driving Organizational Knowledge Sharing
Knowledge and knowledge sharing are an important facet of innovative activities. This paper aims to investigate knowledge creation in innovation context and presents the construct...
Kalle Piirainen, Hannu Kivijärvi, Markku Tuom...
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 6 months ago
Internet Users' Beliefs about Government Surveillance - The Role of Social Awareness and Internet Literacy
This study focuses on exploring Internet literacy and social awareness as antecedents to Internet users’ attitudes towards government surveillance in the Internet environment. P...
Tamara Dinev