Sciweavers

HICSS
2005
IEEE
152views Biometrics» more  HICSS 2005»
14 years 5 months ago
Knowledge Ontology: A Method for Empirical Identification of 'As-Is' Contextual Knowledge
In this paper, we consider existing approaches to ontology definition and validation. Popular techniques include the use of domain experts or reliance on formal logic. We consider...
Theresa Edgington, T. S. Raghu, Ajay S. Vinze
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
14 years 5 months ago
Strategic Versus Tactical Design
Abstract. We seek to distinguish Strategic design decisions (e.g., to adopt a programming paradigm, architectural style, CBSE standard or application framework) from tactical desig...
Amnon H. Eden
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
14 years 5 months ago
Offshore Outsourcing: Counteracting Forces and Their Dynamic Effects
Many argue that offshoring is an inexorable trend since IT skills have become a global commodity and they are vastly cheaper in other parts of the world. According to this view, m...
Amitava Dutta, Rahul Roy
HICSS
2005
IEEE
146views Biometrics» more  HICSS 2005»
14 years 5 months ago
Open Source Enterprise Systems: Towards a Viable Alternative
Enterprise systems are located within the antinomy of appearing as generic product, while being means of multiple integrations for the user through configuration and customisation...
Alexander Dreiling, Helmut Klaus, Michael Rosemann...
HICSS
2005
IEEE
147views Biometrics» more  HICSS 2005»
14 years 5 months ago
Branching Process Models for the Exponentially Increasing Portions of Cascading Failure Blackouts
We introduce branching process models in discrete and continuous time for the exponentially increasing phase of cascading blackouts. Cumulative line trips from real blackout data ...
Ian Dobson, Benjamin A. Carreras, David E. Newman
HICSS
2005
IEEE
182views Biometrics» more  HICSS 2005»
14 years 5 months ago
How the Semantic Web is Being Used: An Analysis of FOAF Documents
— Semantic Web researchers have initially focused on the representation, development and use of ontologies but paid less attention to the social and structural relationships invo...
Li Ding, Lina Zhou, Timothy W. Finin, Anupam Joshi
HICSS
2005
IEEE
117views Biometrics» more  HICSS 2005»
14 years 5 months ago
Mobile Environmental Applications
Mobile communication has developed rapidly in the last few years, shifting from voice to data transfer and offering unique opportunities for providing information. This study focu...
Astrid Dickinger, Peter Heinzmann, Jamie Murphy
HICSS
2005
IEEE
97views Biometrics» more  HICSS 2005»
14 years 5 months ago
Experiences with Conducting Project Postmortems: Reports vs. Stories and Practitioner Perspective
The most popular unit of work in organizations is a project. Managing knowledge in and about projects is salient for successful project management. Explicit knowledge is easier to...
Kevin C. Desouza, Torgeir Dingsøyr, Yukika ...
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
14 years 5 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
HICSS
2005
IEEE
132views Biometrics» more  HICSS 2005»
14 years 5 months ago
NusEye: Visualizing Network Structure to Support Navigation of Aggregated Content
The application of social network analysis techniques, along with graph visualization and interaction, for navigating syndicated web content, a.k.a webfeeds, is presented. Within ...
Brian M. Dennis, Azzari Caillier Jarrett