Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)最新文献

筛选
英文 中文
Fault Tolerance in Bluetooth Scatternet Topologies 蓝牙散射网拓扑中的容错
L. Hodge, R. Whitaker
{"title":"Fault Tolerance in Bluetooth Scatternet Topologies","authors":"L. Hodge, R. Whitaker","doi":"10.1109/HICSS.2006.182","DOIUrl":"https://doi.org/10.1109/HICSS.2006.182","url":null,"abstract":"This paper addresses the optimization of topological characteristics of Bluetooth scatternets which affect network performance. Particular attention is paid to the issue of fault tolerance, and objectives which are in competition with this. Using a multiple objective framework, the optimized trade-off between various topological objectives is determined. This is used to compare the scatternets produced by four decentralized protocols from the literature. The results offer a new basis to analyse and compare decentralized scatternet formation protocols. Results are presented for a range of randomized test problems.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116541862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IT Projects: Conflict, Governance, and Systems Thinking IT项目:冲突、治理和系统思考
D. Johnstone, S. Huff, B. Hope
{"title":"IT Projects: Conflict, Governance, and Systems Thinking","authors":"D. Johnstone, S. Huff, B. Hope","doi":"10.1109/HICSS.2006.235","DOIUrl":"https://doi.org/10.1109/HICSS.2006.235","url":null,"abstract":"Triggered by several embarrassing (and costly) IT project collapses in New Zealand’s public sector, a government report found that effective project control required good governance measures to be in place. Escalating conflict amongst project stakeholders, particularly where the IT projects are large and complex, is often cited as a major contributor to project problems. Conflict, and its resolution, will be affected by factors that are difficult to control, including culture and politics. In this paper we apply the basic concepts of systems thinking to deliver a holistic research framework, focusing on the project-related conflict resolution process. Key constructs include: input (stakeholder conflict); output (e.g. resolution outcome, satisfaction with outcome); contextual factors (e.g. power, culture); and, most importantly, the control mechanism (governance). This framework was empirically tested using a single case study. Our research found strong support for the model.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115080023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Classifying Knowledge Management Systems Based on Context Content 基于上下文内容的知识管理系统分类
M. Jennex
{"title":"Classifying Knowledge Management Systems Based on Context Content","authors":"M. Jennex","doi":"10.1109/HICSS.2006.85","DOIUrl":"https://doi.org/10.1109/HICSS.2006.85","url":null,"abstract":"This paper discusses using users and the amount of context captured by a Knowledge Management System as the basis for classifying systems. The paper discusses previous classification schemes and concludes they aren’t helpful as Knowledge Management in an organization encompasses all the classification criteria in an ongoing basis. Ultimately, it is concluded that classifying the system based on the context for the captured knowledge being stored in the users’ heads or as part of the knowledge base is the appropriate method.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115310786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection 利用移动代理实现结构化分布式软件故障注入
Thomas M. Galla, K. Hummel, B. Peer
{"title":"Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection","authors":"Thomas M. Galla, K. Hummel, B. Peer","doi":"10.1109/HICSS.2006.176","DOIUrl":"https://doi.org/10.1109/HICSS.2006.176","url":null,"abstract":"Embedded distributed real-time systems are traditionally used in safety-critical application areas such as avionics, healthcare, and the automotive sector. Assuring dependability under faulty conditions by means of fault tolerance mechanisms is a major concern in safety-critical systems. From a validation perspective, Software-Implemented Fault Injection (SWIFI) is an approved means for testing fault tolerance mechanisms. In recent work, we have introduced the concept of using mobile agents for distributed SWIFI in time-driven real-time systems. This paper presents a prototypical implementation of the agent platform for the OSEKtime real-time operating system and the FlexRay communication system. It is further shown, how to implement fault injection experiments by means of mobile agents in a structured manner following a classification of faults in terms of domain, persistence, and perception. Based on experiments conducted on ARM-based platforms, selected results are described in detail to demonstrate the potential of mobile agent based fault injection.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114775794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Antecedents of Business Process Outsourcing in Manufacturing Plants 制造工厂业务流程外包的前因后果
I. Bardhan, Jonathan Whitaker, Sunil Mithas
{"title":"Antecedents of Business Process Outsourcing in Manufacturing Plants","authors":"I. Bardhan, Jonathan Whitaker, Sunil Mithas","doi":"10.1109/HICSS.2006.62","DOIUrl":"https://doi.org/10.1109/HICSS.2006.62","url":null,"abstract":"between investments in information technology, manufacturing plant strategies and their impact on business process outsourcing (BPO) in manufacturing plants. Using survey data from US manufacturing plants, we develop a theoretical framework for studying the antecedents of BPO at the plant level. Our analysis suggests that the level of information technology (IT) investments, as a percentage of plant sales, is positively associated with the outsourcing of plant production activities. We also find that plants with higher levels of in-house software infrastructure are less likely to outsource plant support business processes. Furthermore, we find that plant manufacturing strategies and other plant-specific characteristics, such as production volume and the degree of worker unionization, also have a significant impact on the types of business processes that are outsourced. Managerial and research implications of our research into the antecedents of BPO are summarized.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123610775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GPS-Synchronized Data Acquisition: Technology Assessment and Research Issues gps同步数据采集:技术评估与研究问题
A. Meliopoulos, G. Cokkinides, F. Galvan, B. Fardanesh
{"title":"GPS-Synchronized Data Acquisition: Technology Assessment and Research Issues","authors":"A. Meliopoulos, G. Cokkinides, F. Galvan, B. Fardanesh","doi":"10.1109/HICSS.2006.199","DOIUrl":"https://doi.org/10.1109/HICSS.2006.199","url":null,"abstract":"GPS-synchronized equipment (PMUs) is in general higher precision equipment as compared to typical SCADA systems. Conceptually, PMU data are time tagged with accuracy of better than 1 microsecond and magnitude accuracy that is better than 0.1%. This potential performance is not achieved in an actual field installation due to errors from instrumentation channels and system imbalances. Presently, PMU data precision from substation installed devices is practically unknown. On the other hand, specific applications of PMU data require specific accuracy of data. Applications vary from simple system monitoring to wide area protection and control to voltage instability prediction. Each application may have different accuracy requirements. For example for simple system monitoring in steady state highly accurate data may not be critical while for transient instability prediction high precision may be critical. For addressing data precision requirements for a variety of applications, it is necessary to quantify the accuracy of the collected PMU data. We discuss data precision requirements for a variety of applications and we propose a methodology for characterizing data errors. In particular, we propose a new approach for improving data accuracy via estimation methods. The proposed methodology quantifies the expected error of the filtered data. Examples are provided that define the instrumentation requirements for specific applications.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"33 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123591409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
System-Wide Replacement Strategy for Substation Protection and Automation Systems 变电站保护和自动化系统的全系统替换策略
P. Myrda, E. Udren
{"title":"System-Wide Replacement Strategy for Substation Protection and Automation Systems","authors":"P. Myrda, E. Udren","doi":"10.1109/HICSS.2006.446","DOIUrl":"https://doi.org/10.1109/HICSS.2006.446","url":null,"abstract":"The protection and control systems in the US utility industry are still primarily composed of electromechanical relays and systems. Over 80 percent of the relays are still electromechanical at Michigan Electric Transmission Company (METC), with only incremental upgrading to microprocessor technology carried out in recent years. Maintenance costs of older equipment are high, and limited non-operational fault data is accessed via modem from the microprocessor relays. METC embarked on a program to develop a business and technical strategy to replace the aging protection and control equipment. This paper describes how an aggressive replacement strategy can be the most cost-effective solution for system-wide upgrading. This strategy and its benefits (from both reliability and financial perspectives) are described using the program to completely replace the protection and control equipment in all 82 of its substations. METC is developing enterprise-level processing of the masses of data to improve operational and business efficiency.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124733700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Blueprint for Enhancing Future Reliability 提高未来可靠性的蓝图
P. A. Fedora
{"title":"A Blueprint for Enhancing Future Reliability","authors":"P. A. Fedora","doi":"10.1109/HICSS.2006.2","DOIUrl":"https://doi.org/10.1109/HICSS.2006.2","url":null,"abstract":"This paper describes the efforts underway at NPCC to enhance system reliability since the August 2003 Blackout, and summarizes how the NERC and the U.S. - Canadian Power System Outage Task Force Recommendations are being addressed in Northeastern North America.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms 回答数据库查询时披露限制的新方法:保护数字机密数据免受基于数据或算法的内部威胁
R. Garfinkel, R. Gopal, Daniel O. Rice
{"title":"New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms","authors":"R. Garfinkel, R. Gopal, Daniel O. Rice","doi":"10.1109/HICSS.2006.359","DOIUrl":"https://doi.org/10.1109/HICSS.2006.359","url":null,"abstract":"Confidentiality via Camouflage (CVC) is a practical method for giving unlimited, correct, numerical responses to ad-hoc queries to an on-line database, while not compromising confidential numerical data . Responses are in the form of intervals that are guaranteed to contain the exact answer. Virtually any imaginable query type can be answered and although sharing of query answers among users presents no problem, the threat of insider information is real. In this work we identify two distinct types of insider information, depending on whether the knowledge is of data in the confidential field or of the algorithmic process that is used to answer queries. We show that different realizations of CVC can protect against one type of insider threat or the other, while a combination of realizations can be used if the database administrator is not able to specify the type of threat that is present. Various strategies for dealing with cases where a user poses both types of threats are also presented. Computational experience relates the degradation of answer intervals that can be expected based on the type of threat that is protected against and indicates that, in general, algorithmic threat causes the greatest degradation.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129004735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Extracting Useful Information from Security Assessment Interviews 从安全评估访谈中提取有用信息
J. Stanton, Isabelle J. Fagnot
{"title":"Extracting Useful Information from Security Assessment Interviews","authors":"J. Stanton, Isabelle J. Fagnot","doi":"10.1109/HICSS.2006.180","DOIUrl":"https://doi.org/10.1109/HICSS.2006.180","url":null,"abstract":"We conducted N=68 interviews with managers, employees, and information technologists in the course of conducting security assessments of 15 small- and medium-sized organizations. Assessment interviews provide a rich source of information about the security culture and norms of an organization; this information can complement and contextualize the traditional sources of security assessment data, which generally focus on the technical infrastructure of the organization. In this paper we began the process of systematizing audit interview data through the development of a closed vocabulary pertaining to security beliefs. We used a ground-up approach to develop a list of subjects, verbs, objects, and relationships among them that emerged from the audit interviews. We discuss implications for improving the processes and outcomes of security auditing.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129040408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信