Long-term financial transmission rights (FTRs) could be used to create incentives for transmission investments. However, these new investments may cause negative externalities on pre-existing FTRs. Therefore the system operator needs a protocol for awarding incremental FTRs for new transmission capacity that maximize investors' preferences while simultaneously taking into account that the pre-existing network capacity may not be fully allocated by pre-existing FTRs. To preserve revenue adequacy, a minimum amount of currently unassigned FTRs (or proxy FTRs) that satisfies the power flow constraints in the pre-existing network is calculated by the system operator. The challenge is to define the proxy awards. Hogan proposes to define proxy awards as the best use of the current network along the same direction as the incremental FTR awards. This includes allowing positive or negative incremental FTR awards. In this paper we develop a bi-level programming model including a methodology for realizing Hogan's proposal for allocation of long-term FTRs and apply it to a three-node network. Our results show that the simultaneous feasibility of the transmission investment depends on factors such as investor and preset proxy preferences, pre-existing FTRs, and transmission capacity in the expanded and pre-existing network.
{"title":"Merchant Transmission Expansion Based on Financial Transmission Rights","authors":"T. Kristiansen","doi":"10.1109/HICSS.2005.408","DOIUrl":"https://doi.org/10.1109/HICSS.2005.408","url":null,"abstract":"Long-term financial transmission rights (FTRs) could be used to create incentives for transmission investments. However, these new investments may cause negative externalities on pre-existing FTRs. Therefore the system operator needs a protocol for awarding incremental FTRs for new transmission capacity that maximize investors' preferences while simultaneously taking into account that the pre-existing network capacity may not be fully allocated by pre-existing FTRs. To preserve revenue adequacy, a minimum amount of currently unassigned FTRs (or proxy FTRs) that satisfies the power flow constraints in the pre-existing network is calculated by the system operator. The challenge is to define the proxy awards. Hogan proposes to define proxy awards as the best use of the current network along the same direction as the incremental FTR awards. This includes allowing positive or negative incremental FTR awards. In this paper we develop a bi-level programming model including a methodology for realizing Hogan's proposal for allocation of long-term FTRs and apply it to a three-node network. Our results show that the simultaneous feasibility of the transmission investment depends on factors such as investor and preset proxy preferences, pre-existing FTRs, and transmission capacity in the expanded and pre-existing network.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124594586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study examines the non-adoption of a knowledge management system for knowledge exchange among a distributed group of non-life insurance experts. The users participated with enthusiasm in the design process where they provided functional and data specifications for the system. However, a few months after introduction, the system was hardly being used at all. The analysis of the case suggests that non-use of a system can be understood in terms of dissonance, a dominant theme observed in the social dynamics of the implementation. Dissonance was observed through disparate mental models of a system's intention and use, disparate mental models of knowledge and knowledge ownership, and relational power dissonance where the spirit of knowledge sharing imbued in the mission of the system challenges the relational power position between the affected stakeholder groups. Understanding the implications of these issues can be used to inform a requirements engineering process for these kinds of software applications.
{"title":"The Role of Dissonance in Knowledge Exchange: A Case Study of a Knowledge Management System Implementation","authors":"D. T. Pumareja, K. Sikkel","doi":"10.1109/HICSS.2005.613","DOIUrl":"https://doi.org/10.1109/HICSS.2005.613","url":null,"abstract":"This study examines the non-adoption of a knowledge management system for knowledge exchange among a distributed group of non-life insurance experts. The users participated with enthusiasm in the design process where they provided functional and data specifications for the system. However, a few months after introduction, the system was hardly being used at all. The analysis of the case suggests that non-use of a system can be understood in terms of dissonance, a dominant theme observed in the social dynamics of the implementation. Dissonance was observed through disparate mental models of a system's intention and use, disparate mental models of knowledge and knowledge ownership, and relational power dissonance where the spirit of knowledge sharing imbued in the mission of the system challenges the relational power position between the affected stakeholder groups. Understanding the implications of these issues can be used to inform a requirements engineering process for these kinds of software applications.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124650159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Learning through experience shows improvement in productivity. Many models and approaches related to learning or experience curve have been established and successfully applied to the traditional industries. This paper investigates the learning process and extends the idea of improvement through learning to software test processes. A novel quantitative learning model for software life cycle is proposed and compared with the existing learning models. An existing formal software test process model is modified to include effects of learning based on the developed learning model. Finally, the extended quantitative software test process model is applied to several industrial software test projects to validate the improved prediction capabilities of the model.
{"title":"A quantitative Learning Model for Software Test Process","authors":"Ghaffari Abu, João W. Cangussu, J. Turi","doi":"10.1109/HICSS.2005.41","DOIUrl":"https://doi.org/10.1109/HICSS.2005.41","url":null,"abstract":"Learning through experience shows improvement in productivity. Many models and approaches related to learning or experience curve have been established and successfully applied to the traditional industries. This paper investigates the learning process and extends the idea of improvement through learning to software test processes. A novel quantitative learning model for software life cycle is proposed and compared with the existing learning models. An existing formal software test process model is modified to include effects of learning based on the developed learning model. Finally, the extended quantitative software test process model is applied to several industrial software test projects to validate the improved prediction capabilities of the model.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is demonstrated how to provide a peer-to-peer system that supports an expressive query language while maintaining efficient distribution over a wide-area network. The key is to base message routing on the contents of the query messages and to use advertisements from resource providers to make that routing efficient. Advertisements are special queries that describe the data sets available at each site. Queries are encoded as messages that are efficiently distributed to sites providing advertisements Distribution is determined by using a limited form of symbolic execution to intersect queries and advertisements. Performance measurements indicate that cost of symbolic intersection is low.
{"title":"Expressive and Efficient Peer-to-Peer Queries","authors":"D. Heimbigner","doi":"10.1109/HICSS.2005.267","DOIUrl":"https://doi.org/10.1109/HICSS.2005.267","url":null,"abstract":"It is demonstrated how to provide a peer-to-peer system that supports an expressive query language while maintaining efficient distribution over a wide-area network. The key is to base message routing on the contents of the query messages and to use advertisements from resource providers to make that routing efficient. Advertisements are special queries that describe the data sets available at each site. Queries are encoded as messages that are efficiently distributed to sites providing advertisements Distribution is determined by using a limited form of symbolic execution to intersect queries and advertisements. Performance measurements indicate that cost of symbolic intersection is low.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The speed of today's networks has significantly increased in the last decade as has the speed intruders and malicious code can affect these networks. Society has become increasingly connected and dependent on the Internet. At the same time, effectively addressing attacks on the Internet and the critical infrastructures is becoming increasingly complex. Sharing security-related information has been a hot topic since the events of September 11, 2001. Much has been said about the need to transform the attitudes of the intelligence and security communities to foster information sharing. The mechanisms to accomplish this, however, have not been fully developed especially in the cyber arena. To deal with cyber attacks conducted on high-speed networks requires an organized approach from local cyber first-responders to national-level federal agencies. This paper examines the need for high-speed mechanisms to share information between industry and various levels of the government to address national security issues.
{"title":"Information Sharing Needs for National Security","authors":"G. White, David J. DiCenso","doi":"10.1109/HICSS.2005.320","DOIUrl":"https://doi.org/10.1109/HICSS.2005.320","url":null,"abstract":"The speed of today's networks has significantly increased in the last decade as has the speed intruders and malicious code can affect these networks. Society has become increasingly connected and dependent on the Internet. At the same time, effectively addressing attacks on the Internet and the critical infrastructures is becoming increasingly complex. Sharing security-related information has been a hot topic since the events of September 11, 2001. Much has been said about the need to transform the attitudes of the intelligence and security communities to foster information sharing. The mechanisms to accomplish this, however, have not been fully developed especially in the cyber arena. To deal with cyber attacks conducted on high-speed networks requires an organized approach from local cyber first-responders to national-level federal agencies. This paper examines the need for high-speed mechanisms to share information between industry and various levels of the government to address national security issues.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Costabile, M. De Marsico, R. Lanzilotti, V. L. Plantamura, T. Roselli
Despite the advances of the electronic technologies in e-learning, a consolidated evaluation methodology for e-learning applications does not yet exist. The goal of e-learning is to offer the users the possibility to become skillful and acquire knowledge on a new domain. The evaluation of educational software must consider its pedagogic effectiveness as well as its usability. The design of its interface should take into account the way students learn and also provide good usability so that student's interactions with the software are as natural and intuitive as possible. In this paper, we present the results obtained from a first phase of observation and analysis of the interactions of people with e-learning applications. The aim is to provide a methodology for evaluating such applications.
{"title":"On the Usability Evaluation of E-Learning Applications","authors":"M. Costabile, M. De Marsico, R. Lanzilotti, V. L. Plantamura, T. Roselli","doi":"10.1109/HICSS.2005.468","DOIUrl":"https://doi.org/10.1109/HICSS.2005.468","url":null,"abstract":"Despite the advances of the electronic technologies in e-learning, a consolidated evaluation methodology for e-learning applications does not yet exist. The goal of e-learning is to offer the users the possibility to become skillful and acquire knowledge on a new domain. The evaluation of educational software must consider its pedagogic effectiveness as well as its usability. The design of its interface should take into account the way students learn and also provide good usability so that student's interactions with the software are as natural and intuitive as possible. In this paper, we present the results obtained from a first phase of observation and analysis of the interactions of people with e-learning applications. The aim is to provide a methodology for evaluating such applications.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129581755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Knowledge is a complex concept, yet the dominant view of knowledge in the management literature is a dichotomy between tacit and explicit. Even the knowledge management literature tends to view knowledge on a limited number of dimensions, whether this is in discussions of knowledge as a commodity or the process of knowing. A review of knowledge from first principles shows that knowledge has different degrees of validity, is highly heterogeneous and has complicated temporal and social aspects. A model of knowledge based on these aspects is presented. Comparing the four dimensions of knowledge with knowledge as a process opens up a more holistic view of knowledge management and helps articulate some of the key differences within streams of research in the field. This holistic perspective is also compatible with Polanyi's original complex conception of tacit knowledge, which drew heavily on Gestalt theory, a theory that examines the perception of "wholes". The dual perspectives of a multi-dimensional conception of knowledge as a commodity and a holistic perspective on knowledge management expands the avenues of potential research and improves our ability to put knowledge in action within organizations.
{"title":"Moving Beyond Tacit and Explicit: Four Dimensions of Knowledge","authors":"R. Casselman, D. Samson","doi":"10.1109/HICSS.2005.446","DOIUrl":"https://doi.org/10.1109/HICSS.2005.446","url":null,"abstract":"Knowledge is a complex concept, yet the dominant view of knowledge in the management literature is a dichotomy between tacit and explicit. Even the knowledge management literature tends to view knowledge on a limited number of dimensions, whether this is in discussions of knowledge as a commodity or the process of knowing. A review of knowledge from first principles shows that knowledge has different degrees of validity, is highly heterogeneous and has complicated temporal and social aspects. A model of knowledge based on these aspects is presented. Comparing the four dimensions of knowledge with knowledge as a process opens up a more holistic view of knowledge management and helps articulate some of the key differences within streams of research in the field. This holistic perspective is also compatible with Polanyi's original complex conception of tacit knowledge, which drew heavily on Gestalt theory, a theory that examines the perception of \"wholes\". The dual perspectives of a multi-dimensional conception of knowledge as a commodity and a holistic perspective on knowledge management expands the avenues of potential research and improves our ability to put knowledge in action within organizations.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129619795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many techniques have recently been proposed for discovering structural patterns. Using the discovered structural patterns as features for classification has shown success in some application domains. However, the efficiency and effectiveness of such a classification algorithm is often impeded by the huge number of structural patterns discovered by the associated structural pattern mining algorithm. In this paper, we focus on the feature selection problem of structural patterns. The goal is to develop a scheme that effectively selects a subset of structural patterns as the features for the following induction algorithm. We show how to make use of the downward closure property inherent in the structural patterns to design a novel feature selection algorithm. We also evaluate our algorithm by applying the real-world health insurance data for building a classification model to detect health care fraud and abuse. The experimental results show that a great extent of redundant features can be eliminated by our feature selection algorithm, resulting in both accuracy improvement and computation cost reduction.
{"title":"Selecting Structural Patterns for Classification","authors":"Wan-Shiou Yang, San-Yih Hwang, J. Srivastava","doi":"10.1109/HICSS.2005.535","DOIUrl":"https://doi.org/10.1109/HICSS.2005.535","url":null,"abstract":"Many techniques have recently been proposed for discovering structural patterns. Using the discovered structural patterns as features for classification has shown success in some application domains. However, the efficiency and effectiveness of such a classification algorithm is often impeded by the huge number of structural patterns discovered by the associated structural pattern mining algorithm. In this paper, we focus on the feature selection problem of structural patterns. The goal is to develop a scheme that effectively selects a subset of structural patterns as the features for the following induction algorithm. We show how to make use of the downward closure property inherent in the structural patterns to design a novel feature selection algorithm. We also evaluate our algorithm by applying the real-world health insurance data for building a classification model to detect health care fraud and abuse. The experimental results show that a great extent of redundant features can be eliminated by our feature selection algorithm, resulting in both accuracy improvement and computation cost reduction.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127430452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pierre-Majorique Léger, P. Hadaya, L. Cassivi, Olivier Caya
In order to remain competitive, firms' business boundaries are now opening up to their partners. To build value networks, firms are investing in both upstream and downstream relationships and relying more and more on collaborative activities. The development and the safeguarding of firms' business relationship portfolios are becoming strategic activities. However, the power structure in a value network is ever-present as dependency on business partners changes the dynamic of the business relationships. Conducted with 159 firms in the wireless communication sector, the objective of this empirical study is to investigate how relational investments and electronic collaboration within a value network may be carried out differently in various network-dependent contexts. The results indicate that dependent firms are more likely to invest in both upstream and downstream relationships than other firms. However, the results also suggest that e-collaboration is not a safeguarding mechanism against opportunism, but rather a general attitude of business partners within a value network.
{"title":"Dependency in Value Networks: The Safeguarding Effects of Electronic Collaboration and Relational Investments","authors":"Pierre-Majorique Léger, P. Hadaya, L. Cassivi, Olivier Caya","doi":"10.1109/HICSS.2005.189","DOIUrl":"https://doi.org/10.1109/HICSS.2005.189","url":null,"abstract":"In order to remain competitive, firms' business boundaries are now opening up to their partners. To build value networks, firms are investing in both upstream and downstream relationships and relying more and more on collaborative activities. The development and the safeguarding of firms' business relationship portfolios are becoming strategic activities. However, the power structure in a value network is ever-present as dependency on business partners changes the dynamic of the business relationships. Conducted with 159 firms in the wireless communication sector, the objective of this empirical study is to investigate how relational investments and electronic collaboration within a value network may be carried out differently in various network-dependent contexts. The results indicate that dependent firms are more likely to invest in both upstream and downstream relationships than other firms. However, the results also suggest that e-collaboration is not a safeguarding mechanism against opportunism, but rather a general attitude of business partners within a value network.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129970012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptive communication is geared towards understanding the deception process, proposing theories to model it, and developing tools to automate the detection of hostile intent and deception. However, in complex tasks such as deception detection, involvement of teams of human experts is critical in validating the automated tools and agents, improving them, and also in training other humans in detecting deception accurately. This article presents a Group decision support systems (GDSS) framework for deception detection based on collaborative process patterns, thinkLets. The focus of research is on designing group processes to aid deception detection from various information sources such as text transcripts, video clips, and audio clips. Architecture of a prototype under development based on the proposed framework is outlined.
{"title":"Developing Group Decision Support Systems for Deception Detection","authors":"A. Deokar, T. Madhusudan","doi":"10.1109/HICSS.2005.197","DOIUrl":"https://doi.org/10.1109/HICSS.2005.197","url":null,"abstract":"Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptive communication is geared towards understanding the deception process, proposing theories to model it, and developing tools to automate the detection of hostile intent and deception. However, in complex tasks such as deception detection, involvement of teams of human experts is critical in validating the automated tools and agents, improving them, and also in training other humans in detecting deception accurately. This article presents a Group decision support systems (GDSS) framework for deception detection based on collaborative process patterns, thinkLets. The focus of research is on designing group processes to aid deception detection from various information sources such as text transcripts, video clips, and audio clips. Architecture of a prototype under development based on the proposed framework is outlined.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130104501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}