Sciweavers

HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
14 years 6 months ago
Performance of a Wireless Unattended Sensor Network in a Freshwater Environment
This effort investigated the use of wireless unattended sensor network motes in the surroundings of a freshwater lake. The network was required to organize, establish and maintain...
John C. McEachen, Juan Casias
HICSS
2008
IEEE
73views Biometrics» more  HICSS 2008»
14 years 6 months ago
Making the Most of IT Governance Software: Understanding Implementation Processes
Hauke Heier, Hans P. Borgman, Thomas H. Hofbauer
HICSS
2008
IEEE
91views Biometrics» more  HICSS 2008»
14 years 6 months ago
Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice Initiatives
Governments are increasingly using collaborative, cross-boundary strategies to face complex social problems. Many of these cross-boundary initiatives have at their core the use, a...
Theresa A. Pardo, José Ramón Gil-Gar...
HICSS
2008
IEEE
84views Biometrics» more  HICSS 2008»
14 years 6 months ago
Electricity Load and Carbon Dioxide Emissions: Effects of a Carbon Price in the Short Term
Adam Newcomer, Seth Blumsack, Jay Apt, Lester B. L...
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
14 years 6 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
HICSS
2008
IEEE
396views Biometrics» more  HICSS 2008»
14 years 6 months ago
The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait
E-government initiatives are in their infancy in many developing countries. The success of these initiatives is dependent on government support as well as citizens’ adoption of ...
Suha AlAwadhi, Anne Morris
HICSS
2008
IEEE
87views Biometrics» more  HICSS 2008»
14 years 6 months ago
How Many Attackers Can Selfish Defenders Catch?
Marios Mavronicolas, Burkhard Monien, Vicky G. Pap...
HICSS
2008
IEEE
119views Biometrics» more  HICSS 2008»
14 years 6 months ago
Tree Mining in Mental Health Domain
The number of mentally ill people is increasing globally each year. Despite major medical advances, the identification of genetic and environmental factors responsible for mental ...
Maja Hadzic, Fedja Hadzic, Tharam S. Dillon
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
14 years 6 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 6 months ago
STEALing Lab Support in Digital Forensics Education
Timothy M. Vidas, David A. Branch, Alex Nicoll