Sciweavers

HICSS
2006
IEEE
149views Biometrics» more  HICSS 2006»
14 years 3 months ago
An Efficient Heuristic Search for Real-Time Frequent Pattern Mining
Real-time frequent pattern mining for business intelligence systems are currently in the focal area of research. In a number of areas of doing business, especially in the arena of...
Rajanish Dass, Ambuj Mahanti
HICSS
2006
IEEE
90views Biometrics» more  HICSS 2006»
14 years 3 months ago
Student Achievement in the Cisco Networking Academy: Performance in the CCNA1 Course
Alan R. Dennis, Hasan Cakir, Ali Korkmaz, Thomas D...
HICSS
2006
IEEE
164views Biometrics» more  HICSS 2006»
14 years 3 months ago
A Methodology for Generating Application-Specific Heterogeneous Processor Arrays
Hardware designers are increasingly turning to Single Chip Multi-Processors to achieve power and throughput goals. To further increase performance for a specific application the c...
Stephen D. Craven, Cameron Patterson, Peter M. Ath...
HICSS
2006
IEEE
96views Biometrics» more  HICSS 2006»
14 years 3 months ago
A New Instrument to Measure the Success of IT Outsourcing
IT outsourcing has changed fundamentally since its start in the 1960’s. Since IT outsourcing services evolve and expand continuously, instruments to evaluate outsourcing success...
Tomi Dahlberg, Mari Nyrhinen
HICSS
2006
IEEE
132views Biometrics» more  HICSS 2006»
14 years 3 months ago
An Integrated Framework for IT Governance and the Development and Validation of an Assessment Instrument
Our paper presents a new IT governance framework and introduces an assessment tool designed to measure its effectiveness. The framework builds on the integration between the struc...
Tomi Dahlberg, Hannu Kivijärvi
HICSS
2006
IEEE
135views Biometrics» more  HICSS 2006»
14 years 3 months ago
Using Function Generalization to Design a Cosequential Processing Framework
Abstract— Framework design is a multifaceted endeavor undertaken to promote reuse of software within a family of related applications. Traditional approaches involve either the e...
H. Conrad Cunningham, Pallavi Tadepalli
HICSS
2006
IEEE
130views Biometrics» more  HICSS 2006»
14 years 3 months ago
Governance of the IT Function: Valuing Agility and Quality of Training, Cooperation and Communications
It has long been argued that the organizational structure and reporting relationships of the IT functional area profoundly affects organizational performance. However, since most ...
Felipe Csaszar, Eric K. Clemons
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
14 years 3 months ago
Core and Periphery in Free/Libre and Open Source Software Team Communications
The concept of the core group of developers is important and often discussed in empirical studies of FLOSS projects. This paper examines the question, “how does one empirically ...
Kevin Crowston, Kangning Wei, Qing Li, James Howis...
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 3 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 3 months ago
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Art Conklin