Sciweavers

HICSS
2008
IEEE
168views Biometrics» more  HICSS 2008»
14 years 6 months ago
Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, incre...
Gwen Trentham, Hans Jochen Scholl
HICSS
2008
IEEE
143views Biometrics» more  HICSS 2008»
14 years 6 months ago
How Knowledge Map and Personalization Affect Effectiveness of KMS in High-Tech Firms
The shift from a product-based to a knowledge-based economy has resulted in an increasing demand for organizations to implement knowledge management systems (KMS) at an accelerati...
Jung-Yu Lai, Chao-Te Wang, Chun-Yi Chou
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
14 years 6 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
14 years 6 months ago
An Empirical Investigation of the Roles of Outcome Controls and Psychological Factors in Collaboration Technology Supported Virt
The purpose of this research is to examine whether outcome controls of group work (i.e. time pressure and reward) trigger psychological factors (i.e. distraction, motivation, and ...
Fang He, Souren Paul
HICSS
2009
IEEE
106views Biometrics» more  HICSS 2009»
14 years 6 months ago
Fully Distributed Scrum: Replicating Local Productivity and Quality with Offshore Teams
Scrum was designed for hyperproductive teams where productivity increases by 5-10 times over industry averages and many colocated teams have achieved this effect. The question for...
Jeff Sutherland, Guido Schoonheim, Mauritz Rijk
HICSS
2009
IEEE
122views Biometrics» more  HICSS 2009»
14 years 6 months ago
GrayWulf: Scalable Software Architecture for Data Intensive Computing
Big data presents new challenges to both cluster infrastructure software and parallel application design. We present a set of software services and design principles for data inte...
Yogesh Simmhan, Roger S. Barga, Catharine van Inge...
HICSS
2009
IEEE
106views Biometrics» more  HICSS 2009»
14 years 6 months ago
A Radical Approach to Network-on-Chip Operating Systems
Operating systems were created to provide multiple tasks with access to scarce hardware resources like CPU, memory, or storage. Modern programmable hardware, however, may contain ...
Michael Engel, Olaf Spinczyk
HICSS
2009
IEEE
113views Biometrics» more  HICSS 2009»
14 years 6 months ago
TinyOS-Based Quality of Service Management in Wireless Sensor Networks
Nina Peterson, Lohith Anusuya-Rangappa, Behrooz Sh...
HICSS
2009
IEEE
140views Biometrics» more  HICSS 2009»
14 years 6 months ago
Blocking Skype through Deep Packet Inspection
Peter Renals, Grant A. Jacoby
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 6 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...