callback( { "result":{ "query":":facetid:toc:\"db/conf/hicss/hicss2011.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"185.00" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"493", "@dc":"493", "@oc":"493", "@id":"43293776", "text":":facetid:toc:db/conf/hicss/hicss2011.bht" } }, "hits":{ "@total":"493", "@computed":"100", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"4656023", "info":{"authors":{"author":[{"@pid":"58/9191","text":"Mohammed Abdullatif Alzain"},{"@pid":"p/EPardede","text":"Eric Pardede"}]},"title":"Using Multi Shares for Ensuring Privacy in Database-as-a-Service.","venue":"HICSS","pages":"1-9","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/ALzainP11","doi":"10.1109/HICSS.2011.478","ee":"https://doi.org/10.1109/HICSS.2011.478","url":"https://dblp.org/rec/conf/hicss/ALzainP11"}, "url":"URL#4656023" }, { "@score":"1", "@id":"4656024", "info":{"authors":{"author":[{"@pid":"53/9191","text":"Gustav Aagesen"},{"@pid":"52/5629","text":"Anne Fleur van Veenstra"},{"@pid":"j/MarijnJanssen","text":"Marijn Janssen"},{"@pid":"k/JohnKrogstie","text":"John Krogstie"}]},"title":"The Entanglement of Enterprise Architecture and IT-Governance: The Cases of Norway and the Netherlands.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AagesenVJK11","doi":"10.1109/HICSS.2011.412","ee":"https://doi.org/10.1109/HICSS.2011.412","url":"https://dblp.org/rec/conf/hicss/AagesenVJK11"}, "url":"URL#4656024" }, { "@score":"1", "@id":"4656025", "info":{"authors":{"author":[{"@pid":"47/3047","text":"Alireza Abbasi"},{"@pid":"18/6846","text":"Jörn Altmann"}]},"title":"On the Correlation between Research Performance and Social Network Analysis Measures Applied to Research Collaboration Networks.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AbbasiA11","doi":"10.1109/HICSS.2011.325","ee":"https://doi.org/10.1109/HICSS.2011.325","url":"https://dblp.org/rec/conf/hicss/AbbasiA11"}, "url":"URL#4656025" }, { "@score":"1", "@id":"4656026", "info":{"authors":{"author":{"@pid":"66/1540","text":"Babak Abedin"}},"title":"Investigating the Trend of Non-Task Social Interactions in Online Collaborative Learning Environments.","venue":"HICSS","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/Abedin11","doi":"10.1109/HICSS.2011.256","ee":"https://doi.org/10.1109/HICSS.2011.256","url":"https://dblp.org/rec/conf/hicss/Abedin11"}, "url":"URL#4656026" }, { "@score":"1", "@id":"4656027", "info":{"authors":{"author":[{"@pid":"63/6092","text":"Robert K. Abercrombie"},{"@pid":"32/6111","text":"Frederick T. Sheldon"},{"@pid":"m/AliMili","text":"Ali Mili 0001"}]},"title":"Validating Cyber Security Requirements: A Case Study.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AbercrombieSM11","doi":"10.1109/HICSS.2011.480","ee":"https://doi.org/10.1109/HICSS.2011.480","url":"https://dblp.org/rec/conf/hicss/AbercrombieSM11"}, "url":"URL#4656027" }, { "@score":"1", "@id":"4656028", "info":{"authors":{"author":[{"@pid":"88/9189","text":"Daniel Abouakil"},{"@pid":"52/1052","text":"Johannes Heurix"},{"@pid":"96/775","text":"Thomas Neubauer"}]},"title":"Data Models for the Pseudonymization of DICOM Data.","venue":"HICSS","pages":"1-11","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AbouakilHN11","doi":"10.1109/HICSS.2011.136","ee":"https://doi.org/10.1109/HICSS.2011.136","url":"https://dblp.org/rec/conf/hicss/AbouakilHN11"}, "url":"URL#4656028" }, { "@score":"1", "@id":"4656029", "info":{"authors":{"author":[{"@pid":"04/7032","text":"William Acar"},{"@pid":"86/5518","text":"Douglas A. Druckenmiller"}]},"title":"Philosophical Requirements of a Comprehensive D.I. System for Collaborative Modeling.","venue":"HICSS","pages":"1-9","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AcarD11","doi":"10.1109/HICSS.2011.341","ee":"https://doi.org/10.1109/HICSS.2011.341","url":"https://dblp.org/rec/conf/hicss/AcarD11"}, "url":"URL#4656029" }, { "@score":"1", "@id":"4656030", "info":{"authors":{"author":[{"@pid":"13/8980","text":"M. Jamal Afridi"},{"@pid":"06/973","text":"Muddassar Farooq"}]},"title":"OG-Miner: An Intelligent Health Tool for Achieving Millennium Development Goals (MDGs) in m-Health Environments.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AfridiF11","doi":"10.1109/HICSS.2011.320","ee":"https://doi.org/10.1109/HICSS.2011.320","url":"https://dblp.org/rec/conf/hicss/AfridiF11"}, "url":"URL#4656030" }, { "@score":"1", "@id":"4656031", "info":{"authors":{"author":[{"@pid":"15/2785","text":"Anukrati Agrawal"},{"@pid":"82/2444","text":"K. D. Joshi 0001"}]},"title":"A Review of Community of Practice in Organizations: Key Findings and Emerging Themes.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AgrawalJ11","doi":"10.1109/HICSS.2011.26","ee":"https://doi.org/10.1109/HICSS.2011.26","url":"https://dblp.org/rec/conf/hicss/AgrawalJ11"}, "url":"URL#4656031" }, { "@score":"1", "@id":"4656032", "info":{"authors":{"author":[{"@pid":"76/9188","text":"James Aitken"},{"@pid":"88/5762","text":"Emanuela Todeva"}]},"title":"Co-Alignment of Supply Chain Strategies and the Knowledge Outcomes for Buyer-Supplier Network Relationships.","venue":"HICSS","pages":"1-12","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AitkenT11","doi":"10.1109/HICSS.2011.106","ee":"https://doi.org/10.1109/HICSS.2011.106","url":"https://dblp.org/rec/conf/hicss/AitkenT11"}, "url":"URL#4656032" }, { "@score":"1", "@id":"4656033", "info":{"authors":{"author":[{"@pid":"120/5523","text":"Jaffar Alalwan"},{"@pid":"45/9044","text":"Manoj A. Thomas"}]},"title":"Designing ERM Ontology to Evaluate Records Management System.","venue":"HICSS","pages":"1-9","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AlalwanT11","doi":"10.1109/HICSS.2011.149","ee":"https://doi.org/10.1109/HICSS.2011.149","url":"https://dblp.org/rec/conf/hicss/AlalwanT11"}, "url":"URL#4656033" }, { "@score":"1", "@id":"4656034", "info":{"authors":{"author":[{"@pid":"17/4797","text":"Christopher J. Alberts"},{"@pid":"10/1729","text":"Audrey J. Dorofee"},{"@pid":"63/9189","text":"Rita Creel"},{"@pid":"14/2948","text":"Robert J. Ellison"},{"@pid":"79/650","text":"Carol Woody"}]},"title":"A Systemic Approach for Assessing Software Supply-Chain Risk.","venue":"HICSS","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AlbertsDCEW11","doi":"10.1109/HICSS.2011.36","ee":"https://doi.org/10.1109/HICSS.2011.36","url":"https://dblp.org/rec/conf/hicss/AlbertsDCEW11"}, "url":"URL#4656034" }, { "@score":"1", "@id":"4656035", "info":{"authors":{"author":[{"@pid":"48/8102","text":"Anwar Alhenshiri"},{"@pid":"w/CarolynRWatters","text":"Carolyn R. Watters"},{"@pid":"77/2373","text":"Michael A. Shepherd"}]},"title":"User Behaviour during Web Search as Part of Information Gathering.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AlhenshiriWS11","doi":"10.1109/HICSS.2011.470","ee":"https://doi.org/10.1109/HICSS.2011.470","url":"https://dblp.org/rec/conf/hicss/AlhenshiriWS11"}, "url":"URL#4656035" }, { "@score":"1", "@id":"4656036", "info":{"authors":{"author":[{"@pid":"40/4483","text":"Hossam Ali-Hassan"},{"@pid":"50/3774","text":"Dorit Nevo"},{"@pid":"28/5851","text":"Henry M. Kim"},{"@pid":"47/9161","text":"Stephen Perelgut"}]},"title":"Organizational Social Computing and Employee Job Performance: The Knowledge Access Route.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/Ali-HassanNKP11","doi":"10.1109/HICSS.2011.338","ee":"https://doi.org/10.1109/HICSS.2011.338","url":"https://dblp.org/rec/conf/hicss/Ali-HassanNKP11"}, "url":"URL#4656036" }, { "@score":"1", "@id":"4656037", "info":{"authors":{"author":[{"@pid":"89/5252","text":"Omar A. Alnuaimi"},{"@pid":"18/4782","text":"Timothy Paul Cronan"},{"@pid":"48/1395","text":"David E. Douglas"},{"@pid":"05/4301","text":"Moez Limayem"}]},"title":"Healthcare Professionals' Reactions to Health Enterprise System Implementations: A Theory of Cynicism Perspective.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AlnuaimiCDL11","doi":"10.1109/HICSS.2011.220","ee":"https://doi.org/10.1109/HICSS.2011.220","url":"https://dblp.org/rec/conf/hicss/AlnuaimiCDL11"}, "url":"URL#4656037" }, { "@score":"1", "@id":"4656038", "info":{"authors":{"author":[{"@pid":"46/7905","text":"Khalid Alodhaibi"},{"@pid":"b/AlexanderBrodsky","text":"Alexander Brodsky 0001"},{"@pid":"m/GeorgeAMihaila","text":"George A. Mihaila"}]},"title":"A Randomized Algorithm for Maximizing the Diversity of Recommendations.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AlodhaibiBM11","doi":"10.1109/HICSS.2011.25","ee":"https://doi.org/10.1109/HICSS.2011.25","url":"https://dblp.org/rec/conf/hicss/AlodhaibiBM11"}, "url":"URL#4656038" }, { "@score":"1", "@id":"4656039", "info":{"authors":{"author":[{"@pid":"72/9190","text":"Abdullah Alrazgan"},{"@pid":"25/9189","text":"Ajay Nagarajan"},{"@pid":"b/AlexanderBrodsky","text":"Alexander Brodsky 0001"},{"@pid":"49/7117","text":"Nathan E. Egge"}]},"title":"Learning Occupancy Prediction Models with Decision-Guidance Query Language.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AlrazganNBE11","doi":"10.1109/HICSS.2011.281","ee":"https://doi.org/10.1109/HICSS.2011.281","url":"https://dblp.org/rec/conf/hicss/AlrazganNBE11"}, "url":"URL#4656039" }, { "@score":"1", "@id":"4656040", "info":{"authors":{"author":[{"@pid":"97/768","text":"Pedro Antunes 0001"},{"@pid":"51/6454-1","text":"Antonio Ferreira 0001"}]},"title":"Developing Collaboration Awareness Support from a Cognitive Perspective.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AntunesF11","doi":"10.1109/HICSS.2011.161","ee":"https://doi.org/10.1109/HICSS.2011.161","url":"https://dblp.org/rec/conf/hicss/AntunesF11"}, "url":"URL#4656040" }, { "@score":"1", "@id":"4656041", "info":{"authors":{"author":[{"@pid":"68/9188","text":"Saquib Anwar"},{"@pid":"74/9189","text":"Rubana Mohsin"}]},"title":"ERP Project Management in Public Sector - Key Issues and Strategies.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AnwarM11","doi":"10.1109/HICSS.2011.189","ee":"https://doi.org/10.1109/HICSS.2011.189","url":"https://dblp.org/rec/conf/hicss/AnwarM11"}, "url":"URL#4656041" }, { "@score":"1", "@id":"4656042", "info":{"authors":{"author":[{"@pid":"01/966","text":"Christina Aperjis"},{"@pid":"89/2878","text":"Bernardo A. Huberman"},{"@pid":"01/836","text":"Fang Wu"}]},"title":"Human Speed-Accuracy Tradeoffs in Search.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/AperjisHW11","doi":"10.1109/HICSS.2011.228","ee":"https://doi.org/10.1109/HICSS.2011.228","url":"https://dblp.org/rec/conf/hicss/AperjisHW11"}, "url":"URL#4656042" }, { "@score":"1", "@id":"4656043", "info":{"authors":{"author":[{"@pid":"77/8977","text":"Richard Arias-Hernández"},{"@pid":"55/9191","text":"Linda T. Kaastra"},{"@pid":"19/6137","text":"Tera Marie Green"},{"@pid":"25/4412","text":"Brian D. Fisher"}]},"title":"Pair Analytics: Capturing Reasoning Processes in Collaborative Visual Analytics.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/Arias-HernandezKGF11","doi":"10.1109/HICSS.2011.339","ee":"https://doi.org/10.1109/HICSS.2011.339","url":"https://dblp.org/rec/conf/hicss/Arias-HernandezKGF11"}, "url":"URL#4656043" }, { "@score":"1", "@id":"4656044", "info":{"authors":{"author":[{"@pid":"57/4500","text":"Priscilla Arling"},{"@pid":"77/4714","text":"Bradley N. Doebbeling"},{"@pid":"48/9188","text":"Rebekah L. Fox"}]},"title":"Leveraging Social Network Analysis to Improve the Implementation of Evidence-Based Practices and Systems in Healthcare.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/ArlingDF11","doi":"10.1109/HICSS.2011.285","ee":"https://doi.org/10.1109/HICSS.2011.285","url":"https://dblp.org/rec/conf/hicss/ArlingDF11"}, "url":"URL#4656044" }, { "@score":"1", "@id":"4656045", "info":{"authors":{"author":[{"@pid":"32/4292","text":"Julian Bahrs"},{"@pid":"18/5581","text":"Carsten Brockmann"},{"@pid":"g/NorbertGronau","text":"Norbert Gronau"}]},"title":"A Concept for Model Driven Design and Evaluation of Knowledge Transfer.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/BahrsBG11","doi":"10.1109/HICSS.2011.3","ee":"https://doi.org/10.1109/HICSS.2011.3","url":"https://dblp.org/rec/conf/hicss/BahrsBG11"}, "url":"URL#4656045" }, { "@score":"1", "@id":"4656046", "info":{"authors":{"author":[{"@pid":"63/3140","text":"Xiaoyan Bai"},{"@pid":"14/4147","text":"David C. White"},{"@pid":"97/4879","text":"David Sundaram"}]},"title":"Purposeful Visualization.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/BaiWS11","doi":"10.1109/HICSS.2011.353","ee":"https://doi.org/10.1109/HICSS.2011.353","url":"https://dblp.org/rec/conf/hicss/BaiWS11"}, "url":"URL#4656046" }, { "@score":"1", "@id":"4656047", "info":{"authors":{"author":[{"@pid":"61/3749","text":"Robert Baird"},{"@pid":"25/2193","text":"Rose F. Gamble"}]},"title":"Developing a Security Meta-Language Framework.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/BairdG11","doi":"10.1109/HICSS.2011.157","ee":"https://doi.org/10.1109/HICSS.2011.157","url":"https://dblp.org/rec/conf/hicss/BairdG11"}, "url":"URL#4656047" }, { "@score":"1", "@id":"4656048", "info":{"authors":{"author":[{"@pid":"13/7904","text":"Sule Balkan"},{"@pid":"13/669","text":"Michael Goul"}]},"title":"A Portfolio Theoretic Approach to Administering Advanced Analytics: The Case of Multi-Stage Campaign Management.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/BalkanG11","doi":"10.1109/HICSS.2011.22","ee":"https://doi.org/10.1109/HICSS.2011.22","url":"https://dblp.org/rec/conf/hicss/BalkanG11"}, "url":"URL#4656048" }, { "@score":"1", "@id":"4656049", "info":{"authors":{"author":[{"@pid":"16/862","text":"Rajiv D. Banker"},{"@pid":"67/2918","text":"Sunil Wattal"},{"@pid":"78/7895","text":"Iny Hwang"}]},"title":"Determinants of Firm Survival in E-Markets: An Analysis with Software Service Providers.","venue":"HICSS","pages":"1-7","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/BankerWH11","doi":"10.1109/HICSS.2011.154","ee":"https://doi.org/10.1109/HICSS.2011.154","url":"https://dblp.org/rec/conf/hicss/BankerWH11"}, "url":"URL#4656049" }, { "@score":"1", "@id":"4656050", "info":{"authors":{"author":[{"@pid":"16/862","text":"Rajiv D. Banker"},{"@pid":"67/2918","text":"Sunil Wattal"},{"@pid":"96/9188","text":"Jose M. Plehn-Dujowich"}]},"title":"Determinants of Mode of Innovation in IT Firms.","venue":"HICSS","pages":"1-11","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/BankerWP11","doi":"10.1109/HICSS.2011.155","ee":"https://doi.org/10.1109/HICSS.2011.155","url":"https://dblp.org/rec/conf/hicss/BankerWP11"}, "url":"URL#4656050" }, { "@score":"1", "@id":"4656051", "info":{"authors":{"author":[{"@pid":"32/5916","text":"Frank Bannister"},{"@pid":"85/912","text":"Regina Connolly"}]},"title":"New Problems for Old? Defining e-Governance.","venue":"HICSS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/BannisterC11","doi":"10.1109/HICSS.2011.317","ee":"https://doi.org/10.1109/HICSS.2011.317","url":"https://dblp.org/rec/conf/hicss/BannisterC11"}, "url":"URL#4656051" }, { "@score":"1", "@id":"4656052", "info":{"authors":{"author":{"@pid":"15/73","text":"Christian Bartelt"}},"title":"Conflict Analysis at Collaborative Development of Domain Specific Models using Description Logics.","venue":"HICSS","pages":"1-9","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/hicss/Bartelt11","doi":"10.1109/HICSS.2011.126","ee":"https://doi.org/10.1109/HICSS.2011.126","url":"https://dblp.org/rec/conf/hicss/Bartelt11"}, "url":"URL#4656052" } ] } } } )