Sciweavers

HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 4 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
14 years 4 months ago
Applying the normative aspect of stakeholder analysis to electronic commerce diffusion: Stakeholder consideration for the elimin
The digital divide between developed and non-developed countries or large and smaller companies in terms of adoption of new technologies and particularly the Internet and electron...
Anastasia Papazafeiropoulou, Athanasia Pouloudi
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
14 years 4 months ago
Designs for Ramp-Constrained Day-Ahead Auctions
— Some electric power markets allow bidders to specify constraints on ramp rates for increasing or decreasing power production. We show in a small example that a bidder could use...
Shmuel S. Oren, Andrew M. Ross
HICSS
2003
IEEE
359views Biometrics» more  HICSS 2003»
14 years 4 months ago
Assessing the Readiness of Firms for CRM: A Literature Review and Research Model
The concept of customer relationship management (CRM) resonates with managers in today's competitive economy. Yet recent articles in the business press have described CRM imp...
Rosalie J. Ocker, Susan Mudambi
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
14 years 4 months ago
User Centred Opportunities for Supporting Consumer Behaviour Through Handheld and Ubiquitous Computing
Moving around our physical environment, we are surrounded and interact with information that exhorts and stimulates us to buy things. For most of us, not all of these impulses are...
Kenton O'Hara, Mark Perry
HICSS
2003
IEEE
78views Biometrics» more  HICSS 2003»
14 years 4 months ago
The Web of Governance and Democratic Accountability
Developments in e-government are resulting in fundamental reorganizations of the ways in which democratic governments operate as well as in the ways in which citizens relate to th...
Terrell A. Northrup, Stuart J. Thorson
HICSS
2003
IEEE
174views Biometrics» more  HICSS 2003»
14 years 4 months ago
Linking Perception and Action in a Control Architecture for Human-Robot Domains
Human-robot interaction is a growing research domain; there are many approaches to robot design, depending on the particular aspects of interaction being focused on. In this paper...
Monica N. Nicolescu, Maja J. Mataric
HICSS
2003
IEEE
108views Biometrics» more  HICSS 2003»
14 years 4 months ago
Event-based Workflow and the Management Interface
Long transactions cause pragmatic problems for workflow systems – as the transaction is moving, so is the surrounding world. We look at three scenarios in which external events ...
Jeffrey V. Nickerson
HICSS
2003
IEEE
131views Biometrics» more  HICSS 2003»
14 years 4 months ago
An ERP Maintenance Model
Enterprise resource planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Annual maintenance costs approximate 25% of initial ...
Celeste See Pui Ng, Guy G. Gable, Taizan Chan
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
14 years 4 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic