Sciweavers

HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
14 years 3 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
14 years 3 months ago
Email Chronemics: Unobtrusive Profiling of Response Times
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
Yoram M. Kalman, Sheizaf Rafaeli
HICSS
2005
IEEE
123views Biometrics» more  HICSS 2005»
14 years 3 months ago
Enterprise Architecting: Critical Problems
An enterprise architecture (EA) identifies the main components of the organization, its information systems, the ways in which these components work together in order to achieve d...
Stephen H. Kaisler, Frank Armour, Michael Valivull...
HICSS
2005
IEEE
137views Biometrics» more  HICSS 2005»
14 years 3 months ago
Facilitating Human Collaboration with Agents
Ad hoc cross-agency teams are often needed to deal with actual, imminent, or potential crises that involve multiple geographic or political jurisdictions or require coordinated ex...
James E. Just, Mark R. Cornwell, Michael N. Huhns
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
14 years 3 months ago
An Experimental Investigation of Location-Based Services
Whereas the conventional applications mostly assume stationary or fixed users, more and more emphasis is placed on mobility, the need for people to stay connected while moving aro...
Iris A. Junglas
HICSS
2005
IEEE
132views Biometrics» more  HICSS 2005»
14 years 3 months ago
Web Browser Control Using EMG Based Sub Vocal Speech Recognition
—Subvocal electromyogram (EMG) signal classification is used to control a modified web browser interface. Recorded surface signals from the larynx and sublingual areas below the ...
Chuck Jorgensen, Kim Binsted
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 3 months ago
Common Data Model for Design Document Exchange in Business-to-Business Networks
Design documents can be exchanged in business-tobusiness networks through Product Data Management (PDM) system integration. This rarely used approach provides new possibilities fo...
Katrine Jokinen, Jukka Borgman, Reijo Sulonen
HICSS
2005
IEEE
151views Biometrics» more  HICSS 2005»
14 years 3 months ago
Inheritance in the Presence of Asynchronous Method Calls
— This paper considers a formal object-oriented model for distributed computing. Object orientation appears as a leading framework for concurrent and distributed systems. However...
Einar Broch Johnsen, Olaf Owe
HICSS
2005
IEEE
142views Biometrics» more  HICSS 2005»
14 years 3 months ago
An Assembly and Execution Shell for MultiAgent Systems
This paper presents a novel approach to design and develop an assembly and execution shell for multiagent applications based on the concept of a mission. A mission is a live evolv...
Glenn T. Jayaputera, Arkady B. Zaslavsky, Seng Wai...
HICSS
2005
IEEE
204views Biometrics» more  HICSS 2005»
14 years 3 months ago
A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets
Bluetooth is a universal radio interface for short-range wireless networks. The basic Bluetooth network topology is a single-hop star-shaped piconet. Several such piconets can be ...
Deepak Jayanna, Gergely V. Záruba