Sciweavers

HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
14 years 5 months ago
Collection of U.S. Extremist Online Forums: A Web Mining Approach
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Yilu Zhou, Jialun Qin, Guanpi Lai, Hsinchun Chen
HICSS
2007
IEEE
80views Biometrics» more  HICSS 2007»
14 years 5 months ago
Value Capture and Value Networks in Open Source Vendor Strategies
Firms involved in open source software face inherent limits on their ability to appropriate returns from technological innovation. Here I examine the business models used by IT ve...
Joel West
HICSS
2007
IEEE
139views Biometrics» more  HICSS 2007»
14 years 5 months ago
Ontology Driven CPG Authoring and Execution via a Semantic Web Framework
Clinical Practice Guidelines (CPG) are used by healthcare practitioners to standardize clinical practice and to provide evidence mediated health-care. Currently, there have been c...
Sajjad Hussain, Syed Sibte Raza Abidi
HICSS
2007
IEEE
98views Biometrics» more  HICSS 2007»
14 years 5 months ago
A Tool for Training and Assistance in Emergency Response Planning
This paper presents research on developing a new type of software tool for training and assisting the personnel in emergency response planning. The tool, called Disciple-VPT, will...
Gheorghe Tecuci, Mihai Boicu, Thomas Hajduk, Dorin...
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
14 years 5 months ago
Understanding CIO Role Effectiveness: The Antecedents and Consequents
This research-in-progress paper describes the development of a research model exploring the antecedents and consequents of CIO role effectiveness. Specifically, we argue that CIO ...
Daniel Q. Chen, David S. Preston
HICSS
2007
IEEE
136views Biometrics» more  HICSS 2007»
14 years 5 months ago
Analog and Hybrid Computation Approaches for Static Power Flow
Analog and hybrid computation methods are areas of continued interest, particularly in specific applications where traditional digital computation techniques cannot achieve the de...
Aaron St. Leger, Chika O. Nwankpa
HICSS
2007
IEEE
174views Biometrics» more  HICSS 2007»
14 years 5 months ago
A Comparison of Statistical Approaches for Genetic Anticipation with Application to Pancreatic Cancer
Genetic anticipation for a particular disease can involve an earlier age at onset (or, diagnosis), greater severity, and/or a higher number of affected individuals in successive g...
Gleb R. Haynatzki, Randall E. Brand, Vera R. Hayna...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 5 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
HICSS
2007
IEEE
144views Biometrics» more  HICSS 2007»
14 years 5 months ago
Automatic Web Page Categorization using Principal Component Analysis
Today’s search engines retrieve tens of thousands of web pages in response to fairly simple query articulations. These pages are retrieved on the basis of the query terms occurr...
Richong Zhang, Michael A. Shepherd, Jack Duffy, Ca...