Sciweavers

HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 3 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
HICSS
2006
IEEE
135views Biometrics» more  HICSS 2006»
14 years 3 months ago
Optimizing an IT Project Portfolio with Time-Wise Interdependencies
Little research has examined the relevance of real options for valuation of information technology (IT) investments for prioritizing a portfolio of projects. When the effect of pr...
Indranil R. Bardhan, Robert J. Kauffman, Sanjeewa ...
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
14 years 3 months ago
Game Theoretical Analysis of Cooperative Sourcing Scenarios
As an emerging trend in outsourcing, cooperative sourcing is the merging of similar processes of several firms when, for example, several banks merge their payments processing and...
Daniel Beimborn, Hermann-Josef Lamberti, Tim Weitz...
HICSS
2006
IEEE
102views Biometrics» more  HICSS 2006»
14 years 3 months ago
A Model for Simulation Analyses of Cooperative Sourcing in the Banking Industry
This paper presents a model for investigating causes and effects of Cooperative Sourcing in the banking industry. Cooperative Sourcing means merging of similar processes by severa...
Daniel Beimborn
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
14 years 3 months ago
New Probabilistic Method for Estimation of Equipment Failures and Development of Replacement Strategies
When large amount of statistical information about power system component failure rate is available, statistical parametric models can be developed for predictive maintenance. Oft...
Miroslav Begovic, Petar M. Djuric, Joshua Perkel, ...
HICSS
2006
IEEE
152views Biometrics» more  HICSS 2006»
14 years 3 months ago
Distributed Uniform Sampling in Unstructured Peer-to-Peer Networks
— Uniform sampling in networks is at the core of a wide variety of randomized algorithms. Random sampling can be performed by modeling the system as an undirected graph with asso...
Asad Awan, Ronaldo A. Ferreira, Suresh Jagannathan...
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
14 years 3 months ago
The Tension between Integration and Fragmentation in a Component Based Software Development Ecosystem
Historically, software application systems have been produced either individually tailored for the specific customer, or they have been adapted from standardized packages. This pa...
Jens-Magnus Arndt, Jens Dibbern
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
14 years 3 months ago
Reorganizing Government: Bhutan Visa Online
Centralized government document infrastructure and a policy commitment to transform the tourism sector to a more vivid and efficient business sector works as drivers for implement...
Kim Viborg Andersen, Helle Zinner Henriksen
HICSS
2006
IEEE
126views Biometrics» more  HICSS 2006»
14 years 3 months ago
A Model for Temporal Interval Authorizations
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with subjects and...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
14 years 3 months ago
Understanding Locational Reserves and Reliability Needs in Electricity Markets
This paper describes a comprehensive set of examples being developed for the purpose of understanding the interaction between reserves and energy, the need to consider not only en...
Fernando L. Alvarado