{"title":"Human factors aspects of power system voltage visualizations","authors":"D. Wiegmann, A. M. Rich, T. Overbye, Y. Sun","doi":"10.1109/HICSS.2002.993965","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993965","url":null,"abstract":"This paper presents experimental results associated with the human factors aspects of using color contours to visualize electric power system bus voltage magnitude information. Participants were divided into three groups: the first group only one-line numeric data, the second only one-line contour data, while the third saw both. The purpose of the experiment was to determine how quickly participants could both acknowledge low voltage violations and perform corrective control actions. Results indicated the contour only visualization resulted in the quickest voltage violation acknowledgements, while the numeric data only visualization resulted in the quickest solution times. Testing was done using a modified version of the IEEE 118 bus system.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130194770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling resource management for multi-class traffic in mobile cellular networks","authors":"H. Hlavacs, G. Haring, A. Kamra, M. Bansal","doi":"10.1109/HICSS.2002.994024","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994024","url":null,"abstract":"Future cellular mobile networks will be limited by the number of channels available in each cell. On the other hand, new broadband applications like video telephony will demand tight quality of service guarantees that must be met by the network at all times. Thus, advanced mechanisms for allocating these channels to incoming calls with different quality of service level will be of utmost importance. In this paper we introduce a new analytical model for cell channel allocation to multiclass traffic. Being based on Markov chains, the new model exploits the multi-class property and reduces the state space dramatically, thus enabling the solution of previously unsolvable problem classes. We additionally describe CECALL, a simulator implementing several different strategies for allocating cell channels to multiclass traffic, handoff pre-reservation and degradation of low-level call classes. The results of the analytical model are used for explaining important simulation results.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130727154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. S. Harrison, A. Krings, N. Hanebutte, M. McQueen
{"title":"On the performance of a survivability architecture for networked computing systems","authors":"W. S. Harrison, A. Krings, N. Hanebutte, M. McQueen","doi":"10.1109/HICSS.2002.994194","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994194","url":null,"abstract":"This research focusses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel attack signatures and survivability handlers. Higher level survivability mechanisms are implemented using migratory autonomous agents. The potential for fast response to, and recovery from, malicious attacks is the main motivation to implement attack detection and survivability mechanisms at the kernel level. A timing analysis is presented that suggests the real-time feasibility of the two level approach. The limits to real-time response are identified from the host and network point of view. The experimental data derived is important for risk management and analysis in the presence of malicious network and computer attacks.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132598127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Growth and propagation of disturbances in a communication network model","authors":"D. Newman, N. Sizemore, V. Lynch, B. Carreras","doi":"10.1109/HICSS.2002.993977","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993977","url":null,"abstract":"In a society in which information is one of the highest-valued commodities, information networks are the economic backbone. Therefore, network vulnerability is a major hazard. Analysis of communications system traffic suggests that there are a variety of similar dynamical characteristics in widely varying systems. There are some universal features of communication networks that may determine the main dynamics of communications. These are: (1) hardware limitations on network capacity; (2) forcing from the increasing number of users towards the network capacity; and (3) a high level of complexity in those systems. These common features may drive the system dynamics and determine its main intrinsic vulnerabilities. The nontrivial character of network dynamics has already been found in traffic analysis of local area networks that display self-similarities and long-range correlations. This suggests a complex dynamics in the traffic of packets over the network. In this work simple distribution network models with different levels of complexity are examined and compared to each other and to characteristics of real Internet data.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132000836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nontraditional approaches to analyzing design of computer support and user evaluation","authors":"M. Crosby, M. Iding, Y. Waern","doi":"10.1109/HICSS.2002.994091","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994091","url":null,"abstract":"While the potential benefit of additional measurement tools and techniques has been recognized in numerous domains, many questions remain about what to measure and how to get meaningful measurements. Although the majority of researchers seem to agree that user interaction metrics are helpful, the forms of these metrics causes considerable debate. The relationship between humans and computers (HCI) provides a rich area of study from both a theoretical and a practical perspective. Results from HCI research can contribute to theories of human behavior during complex tasks and often the results can be applied to the design of computer systems. An objective in coordinating this mini-track is to encourage a variety of papers that address the need for enhanced, nontraditional measures of performance to evaluate how people use interactive computer systems. Contributions to this mini-track include a wide range of topics as well as evaluation metrics. The first set of papers concerns the evaluation of student learning. Tsaganou, Cavoura and Grigoriadou present a methodology for the experimental construction of a student model of historical text comprehension that was based on a model of comprehension of historical narration (MOCOHN). They conduct an experimental study of students' text comprehension that demonstrated the effectiveness of their proposed student model. Chou employed content analysis to investigate the patterns of student to student interactions in distance learning environments. Vick, using experience gained in face to face classes, judges collaborative knowledge construction using goal-based scenarios in a synchronous computer-mediated communication situations. The second set of papers relies on physiological measurements to assess either skills or mental processes. Serra and Muzio explore the challenges of designing software to assist in the rehabilitation of people who have suffered traumatic brain injuries. They discuss suggestions for ways in which software can minimize the detrimental effects of impaired cognitive functions. Because of the unique characteristics of their patient population, the researchers employ an informal evaluation method and adapt their software to the patients needs. Ark, uses functional Magnetic Resonance Imaging (fMRI) as a tool to understand the cognitive ability of mental rotation. She summarizes findings from recent mental rotation studies and discusses the possible confounds between the reported results. King explores consistencies of eye-movement patterns by building a neural network and using statistics to predict eye movement behavior in different searching tasks. The final two sets of papers involve guidelines for web based materials and the software architecture needed to support web based data collection. Sutcliffe proposes a three-phase model for web site evaluation. He defines usability as a trade-off between increasing the user's motivation and the costs of usability errors. His proposed heuristics","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129217151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creativity in information systems","authors":"B. Massetti, C. Barlow, Shane Thatcher","doi":"10.1109/HICSS.2002.994265","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994265","url":null,"abstract":"As the innovation rates in most markets increase, an organization's ability to sustain creativity in its products, processes and members becomes a significant competitive challenge. Often an organization is considered only to be as valuable as its last great idea. Recognizing that information technology (IT) has the capacity to enable innovative processes and products, many organizations are now looking for IT to directly support their creativity needs. Accordingly, the Creativity in Information Systems (CIS) Minitrack is interested in exploring a wide variety of topics involving when and how creativity can be sustained or enhanced by IT.Because creative people produce creative systems, one area of interest for the CIS Minitrack involves exploring ways to support creativity within the IT function. Not only must IT personnel find creative ways to enhance system acceptance, productivity and satisfaction, but they also are increasingly being expected to develop systems that can enhance the creativity of end users. Awareness and understanding of which tools and techniques best support creativity can help designers and developers create better applications.Another focus for the CIS Minitrack involves examining ways organizational processes have been re-conceptualized using information and communications technology. A consideration of the issues and challenges involved in recognizing the need for process change as well as determining exactly how communications and information technology applications might allow for new processes supports organizational efforts to perform effectively these dynamic times.Because of the variety of topics covered in this year's submissions, we are expecting very lively and interesting discussion. The session begins with a paper by Christopher Barlow from the Illinois Institute of Technology that explores how the approach taken to frame a problem often limits one's awareness of potential solutions. Dr. Barlow develops a model that re-frames the definition of a creative event from ?a newer and better idea? to ?a shift in perspective that makes new possibilities obvious?. He explores the research benefits that are likely to accrue from this shift and offers a preliminary assessment of its usefulness.The second paper, by Drs. Christopher Landauer and Kirstie Bellman from the Aerospace Corporation, discusses some of the challenges faced in developing systems to support human creativity. They describe a system infrastructure they have developed called ?wrapping? that can provide the richness and flexibility required for human support.The third paper, by Dr. Sherry M. B. Thatcher from the University of Arizona, explores the concept of ?identity fit? and its impact on creative performance. She uses the results of a field study to demonstrate how identity fit has a positive effect on creative performance.The fourth paper, by Drs. Keith S. Horton and Rick G. Dewar from Napier University, considers the use of patterns in relation to ","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"26 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120912327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bluenet - a new scatternet formation scheme","authors":"Zhifang Wang, R. Thomas, Z. Haas","doi":"10.1109/HICSS.2002.993971","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993971","url":null,"abstract":"Bluetooth is a novel promising local area wireless technology designed to enable voice and data communication among various electronic devices. We believe that Bluetooth networks will provide reliable, flexible and cost-efficient telecommunication support for the post-deregulation electric power systems. Though not specified in version 1.0 of the Bluetooth specification, communication by way of multi-hop routing (characteristic of ad hoc networks) within a scatternet will offer a new and exciting extension to this technology. The topology of such an ad-hoc scatternet would have a significant effect on the overall performance of the network. We present \"Bluenet\" as a novel and practical scheme for building an efficient scatternet and discuss the basic rules followed by the Bluenet scheme. Two methods are introduced to evaluate the performance of the resulting scatternets based on average shortest path length and maximum traffic flows respectively. Finally the effectiveness of the Bluenet scheme is demonstrated through simulations and comparison.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123402188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Escobar, A. Stanković, P. Mattavelli, R. Ortega
{"title":"On the nonlinear control of TCSC","authors":"G. Escobar, A. Stanković, P. Mattavelli, R. Ortega","doi":"10.1109/HICSS.2002.993973","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993973","url":null,"abstract":"The paper reviews modeling of thyristor-controlled series capacitors (TCSC) which are highly nonlinear systems with continuous and discontinuous states, and proposes three nonlinear controllers for it: (1) an approximate feedback linearization control (FLC); (2) a sliding surface-like design; (3) control in transformed coordinates. Detailed (switched) time-domain simulations are used to verify the control performance achieved by the three controllers.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124784623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Calculation of the probability density function of critical clearing time in transient stability analysis","authors":"Yiqiao Liang, S. Ayasun, C. Nwankpa","doi":"10.1109/HICSS.2002.993972","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993972","url":null,"abstract":"The critical clearing time, t/sub cc/, in power system transient stability analysis is modeled as a random variable due to the random nature of the power system load. A linear approximation approach that mainly involves the sensitivity calculation of the derivative of t/sub cc/ to the system load is developed to obtain the probability density function (PDF) of t/sub cc/ based on the PDF of the system load. A Monte Carlo simulation method is used to verify that this approach is accurate under the condition of small load deviation. The probability of the system being transiently stable for particular disturbances is calculated based on the PDF of t/sub cc/.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using the Internet as a learning medium: an exploration of gender difference in the adoption of FaBWeb","authors":"Carlos K. F. Cheung, M.K.O. Lee, Zhaohui Chen","doi":"10.1109/HICSS.2002.993901","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993901","url":null,"abstract":"In line with V. Venkatesh and M.G. Morris' (2000) study on gender differences in IT adoption, an augmented TAM was employed to scrutinize the gender differences in the student adoption of Internet-based learning medium (ILM). A total of 549 usable self-administered questionnaires were collected, and both psychometric properties and model testing were examined through the LISREL VIII framework. All measures have good psychometric properties and all models provide a good fit to the data with all path coefficients supported. Regardless of the gender, perceived usefulness remains the most important determinant in student adoption of ILM. However, inconsistent findings are found between Venkatesh and Morris' (2000) study and the study presented; we suspect that it may be the result of interaction effects between culture and gender in the determinants of IT adoption and usage. Detailed processes and mechanisms through which the interactions take place and how they act on different components of the TAM is an area calling for future investigations.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125795309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}