{"title":"Fault Tolerance in Bluetooth Scatternet Topologies","authors":"L. Hodge, R. Whitaker","doi":"10.1109/HICSS.2006.182","DOIUrl":"https://doi.org/10.1109/HICSS.2006.182","url":null,"abstract":"This paper addresses the optimization of topological characteristics of Bluetooth scatternets which affect network performance. Particular attention is paid to the issue of fault tolerance, and objectives which are in competition with this. Using a multiple objective framework, the optimized trade-off between various topological objectives is determined. This is used to compare the scatternets produced by four decentralized protocols from the literature. The results offer a new basis to analyse and compare decentralized scatternet formation protocols. Results are presented for a range of randomized test problems.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116541862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT Projects: Conflict, Governance, and Systems Thinking","authors":"D. Johnstone, S. Huff, B. Hope","doi":"10.1109/HICSS.2006.235","DOIUrl":"https://doi.org/10.1109/HICSS.2006.235","url":null,"abstract":"Triggered by several embarrassing (and costly) IT project collapses in New Zealand’s public sector, a government report found that effective project control required good governance measures to be in place. Escalating conflict amongst project stakeholders, particularly where the IT projects are large and complex, is often cited as a major contributor to project problems. Conflict, and its resolution, will be affected by factors that are difficult to control, including culture and politics. In this paper we apply the basic concepts of systems thinking to deliver a holistic research framework, focusing on the project-related conflict resolution process. Key constructs include: input (stakeholder conflict); output (e.g. resolution outcome, satisfaction with outcome); contextual factors (e.g. power, culture); and, most importantly, the control mechanism (governance). This framework was empirically tested using a single case study. Our research found strong support for the model.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115080023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classifying Knowledge Management Systems Based on Context Content","authors":"M. Jennex","doi":"10.1109/HICSS.2006.85","DOIUrl":"https://doi.org/10.1109/HICSS.2006.85","url":null,"abstract":"This paper discusses using users and the amount of context captured by a Knowledge Management System as the basis for classifying systems. The paper discusses previous classification schemes and concludes they aren’t helpful as Knowledge Management in an organization encompasses all the classification criteria in an ongoing basis. Ultimately, it is concluded that classifying the system based on the context for the captured knowledge being stored in the users’ heads or as part of the knowledge base is the appropriate method.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115310786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection","authors":"Thomas M. Galla, K. Hummel, B. Peer","doi":"10.1109/HICSS.2006.176","DOIUrl":"https://doi.org/10.1109/HICSS.2006.176","url":null,"abstract":"Embedded distributed real-time systems are traditionally used in safety-critical application areas such as avionics, healthcare, and the automotive sector. Assuring dependability under faulty conditions by means of fault tolerance mechanisms is a major concern in safety-critical systems. From a validation perspective, Software-Implemented Fault Injection (SWIFI) is an approved means for testing fault tolerance mechanisms. In recent work, we have introduced the concept of using mobile agents for distributed SWIFI in time-driven real-time systems. This paper presents a prototypical implementation of the agent platform for the OSEKtime real-time operating system and the FlexRay communication system. It is further shown, how to implement fault injection experiments by means of mobile agents in a structured manner following a classification of faults in terms of domain, persistence, and perception. Based on experiments conducted on ARM-based platforms, selected results are described in detail to demonstrate the potential of mobile agent based fault injection.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114775794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antecedents of Business Process Outsourcing in Manufacturing Plants","authors":"I. Bardhan, Jonathan Whitaker, Sunil Mithas","doi":"10.1109/HICSS.2006.62","DOIUrl":"https://doi.org/10.1109/HICSS.2006.62","url":null,"abstract":"between investments in information technology, manufacturing plant strategies and their impact on business process outsourcing (BPO) in manufacturing plants. Using survey data from US manufacturing plants, we develop a theoretical framework for studying the antecedents of BPO at the plant level. Our analysis suggests that the level of information technology (IT) investments, as a percentage of plant sales, is positively associated with the outsourcing of plant production activities. We also find that plants with higher levels of in-house software infrastructure are less likely to outsource plant support business processes. Furthermore, we find that plant manufacturing strategies and other plant-specific characteristics, such as production volume and the degree of worker unionization, also have a significant impact on the types of business processes that are outsourced. Managerial and research implications of our research into the antecedents of BPO are summarized.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123610775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Meliopoulos, G. Cokkinides, F. Galvan, B. Fardanesh
{"title":"GPS-Synchronized Data Acquisition: Technology Assessment and Research Issues","authors":"A. Meliopoulos, G. Cokkinides, F. Galvan, B. Fardanesh","doi":"10.1109/HICSS.2006.199","DOIUrl":"https://doi.org/10.1109/HICSS.2006.199","url":null,"abstract":"GPS-synchronized equipment (PMUs) is in general higher precision equipment as compared to typical SCADA systems. Conceptually, PMU data are time tagged with accuracy of better than 1 microsecond and magnitude accuracy that is better than 0.1%. This potential performance is not achieved in an actual field installation due to errors from instrumentation channels and system imbalances. Presently, PMU data precision from substation installed devices is practically unknown. On the other hand, specific applications of PMU data require specific accuracy of data. Applications vary from simple system monitoring to wide area protection and control to voltage instability prediction. Each application may have different accuracy requirements. For example for simple system monitoring in steady state highly accurate data may not be critical while for transient instability prediction high precision may be critical. For addressing data precision requirements for a variety of applications, it is necessary to quantify the accuracy of the collected PMU data. We discuss data precision requirements for a variety of applications and we propose a methodology for characterizing data errors. In particular, we propose a new approach for improving data accuracy via estimation methods. The proposed methodology quantifies the expected error of the filtered data. Examples are provided that define the instrumentation requirements for specific applications.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"33 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123591409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System-Wide Replacement Strategy for Substation Protection and Automation Systems","authors":"P. Myrda, E. Udren","doi":"10.1109/HICSS.2006.446","DOIUrl":"https://doi.org/10.1109/HICSS.2006.446","url":null,"abstract":"The protection and control systems in the US utility industry are still primarily composed of electromechanical relays and systems. Over 80 percent of the relays are still electromechanical at Michigan Electric Transmission Company (METC), with only incremental upgrading to microprocessor technology carried out in recent years. Maintenance costs of older equipment are high, and limited non-operational fault data is accessed via modem from the microprocessor relays. METC embarked on a program to develop a business and technical strategy to replace the aging protection and control equipment. This paper describes how an aggressive replacement strategy can be the most cost-effective solution for system-wide upgrading. This strategy and its benefits (from both reliability and financial perspectives) are described using the program to completely replace the protection and control equipment in all 82 of its substations. METC is developing enterprise-level processing of the masses of data to improve operational and business efficiency.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124733700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blueprint for Enhancing Future Reliability","authors":"P. A. Fedora","doi":"10.1109/HICSS.2006.2","DOIUrl":"https://doi.org/10.1109/HICSS.2006.2","url":null,"abstract":"This paper describes the efforts underway at NPCC to enhance system reliability since the August 2003 Blackout, and summarizes how the NERC and the U.S. - Canadian Power System Outage Task Force Recommendations are being addressed in Northeastern North America.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms","authors":"R. Garfinkel, R. Gopal, Daniel O. Rice","doi":"10.1109/HICSS.2006.359","DOIUrl":"https://doi.org/10.1109/HICSS.2006.359","url":null,"abstract":"Confidentiality via Camouflage (CVC) is a practical method for giving unlimited, correct, numerical responses to ad-hoc queries to an on-line database, while not compromising confidential numerical data . Responses are in the form of intervals that are guaranteed to contain the exact answer. Virtually any imaginable query type can be answered and although sharing of query answers among users presents no problem, the threat of insider information is real. In this work we identify two distinct types of insider information, depending on whether the knowledge is of data in the confidential field or of the algorithmic process that is used to answer queries. We show that different realizations of CVC can protect against one type of insider threat or the other, while a combination of realizations can be used if the database administrator is not able to specify the type of threat that is present. Various strategies for dealing with cases where a user poses both types of threats are also presented. Computational experience relates the degradation of answer intervals that can be expected based on the type of threat that is protected against and indicates that, in general, algorithmic threat causes the greatest degradation.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129004735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extracting Useful Information from Security Assessment Interviews","authors":"J. Stanton, Isabelle J. Fagnot","doi":"10.1109/HICSS.2006.180","DOIUrl":"https://doi.org/10.1109/HICSS.2006.180","url":null,"abstract":"We conducted N=68 interviews with managers, employees, and information technologists in the course of conducting security assessments of 15 small- and medium-sized organizations. Assessment interviews provide a rich source of information about the security culture and norms of an organization; this information can complement and contextualize the traditional sources of security assessment data, which generally focus on the technical infrastructure of the organization. In this paper we began the process of systematizing audit interview data through the development of a closed vocabulary pertaining to security beliefs. We used a ground-up approach to develop a list of subjects, verbs, objects, and relationships among them that emerged from the audit interviews. We discuss implications for improving the processes and outcomes of security auditing.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129040408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}