Sciweavers

HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
14 years 6 months ago
Compositional Variability - Concepts and Patterns
Most software-intensive systems rely on a componentbased design and are therefore made up of encapsulated structural units which are hierarchically composed of one another. In thi...
Mark-Oliver Reiser, Ramin Tavakoli Kolagari, Matth...
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 6 months ago
Active Learning in the Security Classroom
Dino Schweitzer, David Gibson, Mike Collins
HICSS
2009
IEEE
154views Biometrics» more  HICSS 2009»
14 years 6 months ago
Follow The Sun Software Development: New Perspectives, Conceptual Foundation, and Exploratory Field Study
Follow The Sun (FTS) is a special case of global software development. FTS means that software work is handed off every day from one development site to the next -- many time zone...
Erran Carmel, Yael Dubinsky, J. Alberto Espinosa
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 6 months ago
Quantifying IT Value Latency: The Case of the Financial Services Industry
Both the academia and practice recognize that information technology (IT) investments may not yield immediate benefits. Nevertheless, there has been a lack of methodological devel...
Kim Huat Goh, Robert J. Kauffman
HICSS
2009
IEEE
131views Biometrics» more  HICSS 2009»
14 years 6 months ago
MultiProcessor Scheduling is PLS-Complete
Dominic Dumrauf, Burkhard Monien, Karsten Tiemann
HICSS
2009
IEEE
173views Biometrics» more  HICSS 2009»
14 years 6 months ago
Effects of Task Types and Communication Support Tools on E-Negotiation Performance: A Task-Technology Fit Perspective
The rapid growth of the Internet has made computer-mediated communication popular and the use of e-negotiation systems (ENS) has attracted great attention from researchers and pra...
Her-Sen Doong, Hui-Chih Wang, Chi-Kuang Hsieh
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
14 years 6 months ago
Selecting Web Services and Participants for Enforcing Workflow Access Control
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...
San-Yih Hwang, Chuan Yin, Chien-Hsiang Lee
HICSS
2009
IEEE
116views Biometrics» more  HICSS 2009»
14 years 6 months ago
Systems Modeling for IP-Based Handoff Using Timed Petri Nets
The mechanisms and design principles needed for achieving optimized handoff for mobile Internet services are poorly understood and need better analysis. This paper contributes to ...
Ashutosh Dutta, Bryan Lyles, Henning Schulzrinne, ...
HICSS
2009
IEEE
94views Biometrics» more  HICSS 2009»
14 years 6 months ago
Information Personalization in a Two Dimensional Product Differentiation Model: Impact of Market Structure and the Quality-Fit R
In this research, we use a game-theoretic model to examine personalization of information in a twodimensional product differentiation model, when consumers attach importance to ‘...
Sunil Wattal, Rahul Telang, Tridas Mukhopadhyay
HICSS
2009
IEEE
134views Biometrics» more  HICSS 2009»
14 years 6 months ago
Simulating Large-Scale P2P Assisted Video Streaming
In this paper, we show through detailed simulations that BitTorrent can be used to assist a server or content distribution network (CDN) for large-scale streaming delivery. Speciï...
Ryan LaFortune, Christopher D. Carothers, William ...