Sabine R. Öhring, F. Sarkar, Sajal K. Das, Dirk H. Hohndel
{"title":"Cayley graph connected cycles: A new class of fixed-degree interconnection networks","authors":"Sabine R. Öhring, F. Sarkar, Sajal K. Das, Dirk H. Hohndel","doi":"10.1109/HICSS.1995.375509","DOIUrl":"https://doi.org/10.1109/HICSS.1995.375509","url":null,"abstract":"We introduce a new class of fixed-degree interconnection networks, called the Cayley graph connected cycles, which includes the well known cube-connected cycles as a special case. This class of networks is shown to be vertex-symmetric and maximally fault tolerant (if the given Cayley graph is maximally fault tolerant). We propose simple routing and broadcasting algorithms for these networks in general, and improve them for special types of Cayley graph connected cycles having abelian generator-sets. Furthermore, the average distance in these networks is analyzed.<<ETX>>","PeriodicalId":433759,"journal":{"name":"Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information technology and the transformation of decision making","authors":"Richard Chimera","doi":"10.1109/HICSS.1995.375568","DOIUrl":"https://doi.org/10.1109/HICSS.1995.375568","url":null,"abstract":"Business analysis and the associated decision making was once a domain full of built-in advantages and ad hoc methods. With the advent of computers and information networks, the playing field has been leveled somewhat by immediate and ubiquitous access to information. Automated methods for simplistic, mundane tasks are a good start to putting information technology to work for business professionals. Truly far-reaching advances for complex tasks and gargantuan information spaces can be found in human-computer interface software and issues. Prototype systems and novel interaction paradigms have been applied to database query systems and information visualization. The results range from outstanding improvement to revolutionary and qualitative changes to what is now possible.<<ETX>>","PeriodicalId":433759,"journal":{"name":"Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121798745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling the client-server behaviour of parallel real-time systems using Petri nets","authors":"C. I. Birkinshaw, P. Croll","doi":"10.1109/HICSS.1995.375444","DOIUrl":"https://doi.org/10.1109/HICSS.1995.375444","url":null,"abstract":"Guaranteeing the timeliness of a parallel hard real-time system, requires knowledge of its communication behaviour. Analysis of the communication structure can identify potential livelock and deadlock in parallel systems. An approach which describes the communications of parallel systems, called a client-server behaviour graph, is given which enables a Petri net model of a complete system to be built in a compositional manner, reducing the state explosion problem in the identification of both deadlocks and livelocks.<<ETX>>","PeriodicalId":433759,"journal":{"name":"Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embeddings of complete binary trees into star graphs with congestion 1","authors":"M. Heydemann, J. Opatrny, D. Sotteau","doi":"10.1109/HICSS.1995.375502","DOIUrl":"https://doi.org/10.1109/HICSS.1995.375502","url":null,"abstract":"Gives a construction of embeddings of vertex-congestion 1 and dilation 4 of complete binary trees into star graphs. The height of the trees embedded into the n-dimensional star graph S/sub n/ is (n+1)[log/sub 2/ n]-2/sup [log n]+1/+1, which improves the previous result from Bouabdallah and Heydemann (1993, 1994) by more than n/2-1. We then construct embeddings of vertex-congestion 1, dilation at most (5n/4)+2, of complete binary trees into the n-dimensional star graph, whose height differs from the theoretical upper bound of log/sub 2/n! by less than 3[log/sub 2/n]. Our results show that the star networks can efficiently simulate algorithms that are intended for a binary tree architecture.<<ETX>>","PeriodicalId":433759,"journal":{"name":"Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences","volume":"597 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120974979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User (dis)satisfaction and discrepancy in information systems: an integrated model and empirical investigation","authors":"Jonathan B. Woodroff, G. M. Kasper","doi":"10.1109/HICSS.1995.375674","DOIUrl":"https://doi.org/10.1109/HICSS.1995.375674","url":null,"abstract":"The notion of user satisfaction (US) in information systems has received much attention over the past two decades. Despite this attention, there has been little progress toward a stream of research that is consistent and replicable. This lack of progress has been attributed to inadequate conceptual development of the US construct. Inadequate conceptual development has resulted in varied definitions and operationalizations of US, and has contributed to results that are inconsistent. Incorporating research done on satisfaction in the reference disciplines of organizational behavior and consumer behavior, this paper proposes and develops a broader and more comprehensive model of a user's affective response (UAR) to an information system. The UAR model provides a framework for investigating critical dimensions of UAR that previous work may have neglected, and suggests that user dissatisfaction may be as important a construct in information systems as is US.<<ETX>>","PeriodicalId":433759,"journal":{"name":"Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stochastic assembly of contig restriction maps","authors":"D. M. Platt, T. Dix","doi":"10.1109/HICSS.1995.375341","DOIUrl":"https://doi.org/10.1109/HICSS.1995.375341","url":null,"abstract":"An algorithm is described that takes an ordered set of genomic mapping clones and fragment measurements from a restriction digest of each clone, and stochastically produces a contig restriction map of the clones. This is done by defining a map representation in terms of those pairs of fragments that coincide in the map. The fragment pairing is performed stochastically according to similarity between fragments. The search for good maps is guided by an objective function that uses a model based on minimum message length principles. Maps very close to the correct arrangement for known maps are found using this technique, without the need for the human supervision required by earlier techniques. Results from the application of the algorithm to a group of clones from the CEA gene region of chromosome 19 are given.<<ETX>>","PeriodicalId":433759,"journal":{"name":"Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126047218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning from group support system use: potential changes in subsequent meeting behavior","authors":"John A. Hoxmeier","doi":"10.1109/HICSS.1995.375732","DOIUrl":"https://doi.org/10.1109/HICSS.1995.375732","url":null,"abstract":"Utilises a cross-sectional survey design to compare the differences between group support system (GSS)-influenced manual meetings and non-GSS manual meetings. The research employed a quasiexperimental field study. The responses of GSS participants of a TeamFocus facility were compared to a control group who had not been exposed to the technology. Perceptual quantitative data on five composite meeting behaviors and other moderator and control variables were collected through surveys. Individual interviews were held to triangulate the survey data and add depth to the assessment of group differences. Measures of meeting behaviors were based on individual-level recall and attitudinal data. The data was used to test five hypotheses about GSS applied behaviors. Results showed that the two groups were different and that the GSS group rated their subsequent non-GSS meetings as more productive and satisfying than those of the control group.<<ETX>>","PeriodicalId":433759,"journal":{"name":"Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126098930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information systems application educational needs of small enterprises-a survey of Finnish circumstances","authors":"R. Suomi, Monika Kastu-Haikio","doi":"10.1109/HICSS.1995.375686","DOIUrl":"https://doi.org/10.1109/HICSS.1995.375686","url":null,"abstract":"This study discusses how information systems application education can help small and medium-sized enterprises in their application of information technology. The supply for education in information systems application seems to be divided into two parts. First there is the basic education gained before beginning of the active career. Through this education young people are nowadays quite well equipped with knowledge on information systems application. On the other hand, there are different supplementary offerings for those active in the daily professional work. This sector of education is characterized with heterogeneity and many times high expenses. This set of offerings for those in practical work is also the focus of our discussion here. Our study here is based on a survey among a group of Finnish small and medium-sized enterprises.<<ETX>>","PeriodicalId":433759,"journal":{"name":"Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125480124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient CMOS microprocessor design","authors":"T. Burd, R. Brodersen","doi":"10.1109/HICSS.1995.375385","DOIUrl":"https://doi.org/10.1109/HICSS.1995.375385","url":null,"abstract":"Reduction of power dissipation in microprocessor design is becoming a key design constraint. This is motivated not only by portable electronics, in which battery weight and size is critical, but by heat dissipation issues in larger desktop and parallel machines as well. By identifying the major modes of computation of these processors and by proposing figures of merit for each of these modes, a power analysis methodology is developed. It allows the energy efficiency of various architectures to be quantified, and provides techniques for either individually optimizing or trading off throughput and energy consumption. The methodology is then used to qualify three important design principles for energy-efficient microprocessor design.<<ETX>>","PeriodicalId":433759,"journal":{"name":"Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122482403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology transfer in Sandia's scientific areas. The engineering sciences Technology Information Environment. Systematic approach to security, privacy and appropriate access","authors":"Sul Passicieh, John Zepper","doi":"10.1109/HICSS.1995.375679","DOIUrl":"https://doi.org/10.1109/HICSS.1995.375679","url":null,"abstract":"This paper describes the need for faster and more efficient technology transfer mechanisms. It outlines the design of a computerized technology transfer mechanism for the engineering sciences area based on Sandia National Laboratories' Technology Information Environment for Industry (TIE-IN). It explains the security, privacy and appropriate access issues that arose in the design of the system.<<ETX>>","PeriodicalId":433759,"journal":{"name":"Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}