Electricity industries worldwide are undergoing a period of profound upheaval. Conventional vertically integrated mechanism is replaced by a competitive market environment. A pure operating cost optimization is not enough to model the distributed, large-scale complex system. A market simulator will be a valuable training and evaluation tool to assist sellers, buyers & regulators to understand system’s dynamic performance and make better decisions avoiding bunch of risks. The objective of this research is to model market players by adaptive multi-agent system, compare the performances of different artificial life technique such as Genetic Algorithm (GA), Evolutionary Programming (EP) and Particle Swarm (PS) in simulating players’ behaviors, identify the best method to emulates real rational participants.
{"title":"Comparison of Artificial Life Techniques for Market Simulation","authors":"F. Gao, G. Gutiérrez-Alcaraz, G. Sheblé","doi":"10.1109/HICSS.2006.89","DOIUrl":"https://doi.org/10.1109/HICSS.2006.89","url":null,"abstract":"Electricity industries worldwide are undergoing a period of profound upheaval. Conventional vertically integrated mechanism is replaced by a competitive market environment. A pure operating cost optimization is not enough to model the distributed, large-scale complex system. A market simulator will be a valuable training and evaluation tool to assist sellers, buyers & regulators to understand system’s dynamic performance and make better decisions avoiding bunch of risks. The objective of this research is to model market players by adaptive multi-agent system, compare the performances of different artificial life technique such as Genetic Algorithm (GA), Evolutionary Programming (EP) and Particle Swarm (PS) in simulating players’ behaviors, identify the best method to emulates real rational participants.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116035119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Collaborative Virtual Environments (CVEs) show great promise in domains such as education. Instead of using 3D space to weakly imitate physical classrooms, educators can create 3D spaces that directly reflect subject matter, and allow students to interact with it. Using non-physical 3D spaces creates potential orientation and navigation problems, which are best solved by means of (a) familiar metaphors and (b) repeated, gradually expanding experiences within the virtual space. This paper explores the use of maps and routes to navigate not the 3D virtual environment, but the records of users' previous experiences in the environment. Our premise is that textual content (whether lecture or lab material, or chat transcripts) can be more effectively navigated using appropriate temporal and subject-oriented aids, instead of relying on scrollbars or textual searches. We are exploring these concepts within the context of Unicron, a collaborative virtual environment for education.
{"title":"Remembrance of Things Past: Using Maps and Routes to Navigate through Virtual Environment Experiences","authors":"Gustav Verhulsdonck, C. Jeffery","doi":"10.1109/HICSS.2006.414","DOIUrl":"https://doi.org/10.1109/HICSS.2006.414","url":null,"abstract":"Collaborative Virtual Environments (CVEs) show great promise in domains such as education. Instead of using 3D space to weakly imitate physical classrooms, educators can create 3D spaces that directly reflect subject matter, and allow students to interact with it. Using non-physical 3D spaces creates potential orientation and navigation problems, which are best solved by means of (a) familiar metaphors and (b) repeated, gradually expanding experiences within the virtual space. This paper explores the use of maps and routes to navigate not the 3D virtual environment, but the records of users' previous experiences in the environment. Our premise is that textual content (whether lecture or lab material, or chat transcripts) can be more effectively navigated using appropriate temporal and subject-oriented aids, instead of relying on scrollbars or textual searches. We are exploring these concepts within the context of Unicron, a collaborative virtual environment for education.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116133528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper highlights some managerial challenges encountered during the adoption of a Picture Archiving and Communication System (PACS) at Turku University Central Hospital (TUCH). The results are based on a five-year survey consisting of statistical data, cost analysis, modelling, customer satisfaction inquiries, time and motion studies, observation and staff interviews. The PACS is a medical information system, the goal of which is to allow filmless activity and improve patient care; this paper presents the curriculum of the project. As there was a lack of insight of the project being a hospital-wide socio-technical information infrastructure process, with both costs and benefits falling to all departments requiring both vertical and horizontal management at hospital level, hospital staff were unprepared for the change. Further, the technology providers did not have sufficient information or knowledge of clinical requirements. Consequently, inexperience regarding informatics, system behavior, and lack of designated expert personnel slowed down the implementation process.
{"title":"Challenges in the Adoption of Medical Information Systems","authors":"M. Maass, O. Eriksson","doi":"10.1109/HICSS.2006.82","DOIUrl":"https://doi.org/10.1109/HICSS.2006.82","url":null,"abstract":"This paper highlights some managerial challenges encountered during the adoption of a Picture Archiving and Communication System (PACS) at Turku University Central Hospital (TUCH). The results are based on a five-year survey consisting of statistical data, cost analysis, modelling, customer satisfaction inquiries, time and motion studies, observation and staff interviews. The PACS is a medical information system, the goal of which is to allow filmless activity and improve patient care; this paper presents the curriculum of the project. As there was a lack of insight of the project being a hospital-wide socio-technical information infrastructure process, with both costs and benefits falling to all departments requiring both vertical and horizontal management at hospital level, hospital staff were unprepared for the change. Further, the technology providers did not have sufficient information or knowledge of clinical requirements. Consequently, inexperience regarding informatics, system behavior, and lack of designated expert personnel slowed down the implementation process.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121805779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Irene Pollach, Andreas Pinterits, Horst Treiblmaier
Although the critical role of the Internet for disseminating environmental information to achieve sustainability is widely recognized, academic research has not paid much attention to the functionality and accessibility of environmental Web sites maintained by organizations in the public or the voluntary sector. To fill this gap, the present study seeks to suggest ways in which environmental Web sites could make more effective use of the Internet's capabilities for disseminating information. This paper investigates 226 environmental Web sites, taking into account features such as orientation devices, interaction, information exchange, timeliness, accessibility and the possibility of donating online. Different types of Web sites (air, forest, water, directories) are compared and examined for signiJicant differences. The results strongly suggest that environmental Web sites have not yet fully tapped the Internet's potential, since only few environmental Web sites meet the overall technical, functional and design-related stanhrds their commercial counterparts have adopted.
{"title":"Environmental Web Sites: An Empirical Investigation of Functionality and Accessibility","authors":"Irene Pollach, Andreas Pinterits, Horst Treiblmaier","doi":"10.1109/HICSS.2006.158","DOIUrl":"https://doi.org/10.1109/HICSS.2006.158","url":null,"abstract":"Although the critical role of the Internet for disseminating environmental information to achieve sustainability is widely recognized, academic research has not paid much attention to the functionality and accessibility of environmental Web sites maintained by organizations in the public or the voluntary sector. To fill this gap, the present study seeks to suggest ways in which environmental Web sites could make more effective use of the Internet's capabilities for disseminating information. This paper investigates 226 environmental Web sites, taking into account features such as orientation devices, interaction, information exchange, timeliness, accessibility and the possibility of donating online. Different types of Web sites (air, forest, water, directories) are compared and examined for signiJicant differences. The results strongly suggest that environmental Web sites have not yet fully tapped the Internet's potential, since only few environmental Web sites meet the overall technical, functional and design-related stanhrds their commercial counterparts have adopted.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123796961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Strong identity management enforced with digital authentication mechanisms has become the leading requirement to improve cyber security for utility operations. Utility operators don’t really care how it works as long as they are confident that it does work. They want a solution that is standards-based, is interoperable with the commonly installed applications, and is extendable for legacy systems to lower the cost of ownership. General recommendations for a cryptographically-based cyber security solution are well defined in the American Gas Association’s Report No. 12, Part 1, and commercial products are now available to implement these requirements. This paper presents, from a utility operator’s point of view, the requirements to securely manage the keying material to protect SCADA communications and to access the maintenance ports of field devices. This paper also outlines areas of future investigation needed for a comprehensive solution.
{"title":"Cyber Security Management for Utility Operations","authors":"D. Holstein, Jose Diaz","doi":"10.1109/HICSS.2006.111","DOIUrl":"https://doi.org/10.1109/HICSS.2006.111","url":null,"abstract":"Strong identity management enforced with digital authentication mechanisms has become the leading requirement to improve cyber security for utility operations. Utility operators don’t really care how it works as long as they are confident that it does work. They want a solution that is standards-based, is interoperable with the commonly installed applications, and is extendable for legacy systems to lower the cost of ownership. General recommendations for a cryptographically-based cyber security solution are well defined in the American Gas Association’s Report No. 12, Part 1, and commercial products are now available to implement these requirements. This paper presents, from a utility operator’s point of view, the requirements to securely manage the keying material to protect SCADA communications and to access the maintenance ports of field devices. This paper also outlines areas of future investigation needed for a comprehensive solution.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125067759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents technical foundation, roadmap and initial results of the IDIOM project (Information Diffusion across Interactive Online Media). Information spreads rapidly across Web sites, Web logs and online forums. IDIOM tracks this process and compares it to direct communication through electronic mail and instant messaging. Linguists define "idiom" as an expression whose meaning is different from the literal meanings of its component words. Similarly, the study of information diffusion promises insights that cannot be inferred from individual network elements. Similar projects often focus on particular media, or neglect important aspects of the human language. IDIOM addresses these gaps to reveal fundamental mechanisms of information diffusion across media with distinct interactive characteristics.
{"title":"An Ontology-Based Architecture for Tracking Information across Interactive Electronic Environments","authors":"A. Scharl, A. Weichselbraun","doi":"10.1109/HICSS.2006.60","DOIUrl":"https://doi.org/10.1109/HICSS.2006.60","url":null,"abstract":"This paper presents technical foundation, roadmap and initial results of the IDIOM project (Information Diffusion across Interactive Online Media). Information spreads rapidly across Web sites, Web logs and online forums. IDIOM tracks this process and compares it to direct communication through electronic mail and instant messaging. Linguists define \"idiom\" as an expression whose meaning is different from the literal meanings of its component words. Similarly, the study of information diffusion promises insights that cannot be inferred from individual network elements. Similar projects often focus on particular media, or neglect important aspects of the human language. IDIOM addresses these gaps to reveal fundamental mechanisms of information diffusion across media with distinct interactive characteristics.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131340844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jochen Malinowski, Tobias Keim, O. Wendt, Tim Weitzel
Recommendation systems are widely used on the Internet to assist customers in finding the products or services that best fit with their individual preferences. While current implementations successfully reduce information overload by generating personalized suggestions when searching for objects such as books or movies, recommendation systems so far cannot be found in another potential field of application: the personalized search for subjects such as applicants in a recruitment scenario. Theory shows that a good match between persons and jobs needs to consider both, the preferences of the recruiter and the preferences of the candidate. Based on this requirement for modeling bilateral selection decisions, we present an approach applying two distinct recommendation systems to the field in order to improve the match between people and jobs. Finally, we present first validation test runs from a student experiment showing promising results.
{"title":"Matching People and Jobs: A Bilateral Recommendation Approach","authors":"Jochen Malinowski, Tobias Keim, O. Wendt, Tim Weitzel","doi":"10.1109/HICSS.2006.266","DOIUrl":"https://doi.org/10.1109/HICSS.2006.266","url":null,"abstract":"Recommendation systems are widely used on the Internet to assist customers in finding the products or services that best fit with their individual preferences. While current implementations successfully reduce information overload by generating personalized suggestions when searching for objects such as books or movies, recommendation systems so far cannot be found in another potential field of application: the personalized search for subjects such as applicants in a recruitment scenario. Theory shows that a good match between persons and jobs needs to consider both, the preferences of the recruiter and the preferences of the candidate. Based on this requirement for modeling bilateral selection decisions, we present an approach applying two distinct recommendation systems to the field in order to improve the match between people and jobs. Finally, we present first validation test runs from a student experiment showing promising results.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131755252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Users increasingly expect access to Web data from a wide range of devices, both wired and wireless. The goal of our research is to inform the design of applications that support data access by providing reasonably seamless migration of data among internet-compatible devices with minimal loss of effectiveness and efficiency. This study focuses on overview representations of tables of data on small mobile devices, where the user selectively expands areas as needed to access individual cells. In this paper we report on the results of a user study that compares a lookahead technique with the more familiar column expansion technique for use with compressed tables on small screens. The results show little difference for simple tasks but that for complex tasks, the lookahead technique was more efficient and preferred to the column expansion technique when used with an overview representation of a table on a small screen device.
{"title":"Lookahead Cascade for Table Access on Small Devices","authors":"Rui Zhang, C. Watters, Jack Duffy","doi":"10.1109/HICSS.2006.256","DOIUrl":"https://doi.org/10.1109/HICSS.2006.256","url":null,"abstract":"Users increasingly expect access to Web data from a wide range of devices, both wired and wireless. The goal of our research is to inform the design of applications that support data access by providing reasonably seamless migration of data among internet-compatible devices with minimal loss of effectiveness and efficiency. This study focuses on overview representations of tables of data on small mobile devices, where the user selectively expands areas as needed to access individual cells. In this paper we report on the results of a user study that compares a lookahead technique with the more familiar column expansion technique for use with compressed tables on small screens. The results show little difference for simple tasks but that for complex tasks, the lookahead technique was more efficient and preferred to the column expansion technique when used with an overview representation of a table on a small screen device.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121839992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Finding frequent patterns from databases has been the most time consuming process in data mining tasks, like association rule mining. Frequent pattern mining in real-time is of increasing thrust in many business applications such as e-commerce, recommender systems, and supply-chain management and group decision support systems, to name a few. A plethora of efficient algorithms have been proposed till date, among which, vertical mining algorithms have been found to be very effective, usually outperforming the horizontal ones. However, with dense datasets, the performances of these algorithms significantly degrade. Moreover, these algorithms are not suited to respond to the real-time need. In this paper, we describe BDFS(b)-diff-sets, an algorithm to perform real-time frequent pattern mining using diff-sets and limited computing resources. Empirical evaluations show that our algorithm can make a fair estimation of the probable frequent patterns and reaches some of the longest frequent patterns much faster than the existing algorithms.
{"title":"An Efficient Algorithm for Real-Time Frequent Pattern Mining for Real-Time Business Intelligence Analytics","authors":"Rajanish Dass, A. Mahanti","doi":"10.1109/HICSS.2006.49","DOIUrl":"https://doi.org/10.1109/HICSS.2006.49","url":null,"abstract":"Finding frequent patterns from databases has been the most time consuming process in data mining tasks, like association rule mining. Frequent pattern mining in real-time is of increasing thrust in many business applications such as e-commerce, recommender systems, and supply-chain management and group decision support systems, to name a few. A plethora of efficient algorithms have been proposed till date, among which, vertical mining algorithms have been found to be very effective, usually outperforming the horizontal ones. However, with dense datasets, the performances of these algorithms significantly degrade. Moreover, these algorithms are not suited to respond to the real-time need. In this paper, we describe BDFS(b)-diff-sets, an algorithm to perform real-time frequent pattern mining using diff-sets and limited computing resources. Empirical evaluations show that our algorithm can make a fair estimation of the probable frequent patterns and reaches some of the longest frequent patterns much faster than the existing algorithms.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127768730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate depth of education. Active learning theory provides insight into methods of increasing skill development and retention through specific instructional methods. Applying active learning to a capstone course in information security centered around management of security in a business setting has been shown to be highly effective. Using a Cyber Defense Competition to provide a hands-on opportunity for students to test their skills and develop team based management skills in an operational business environment impacts many constituencies. Participating students learn in a true active learning environment. Instructors are able to evaluate the thoroughness of their curriculum in its intended setting. Other students learn as teams prepare for the competition. In the end, everyone feels they had learned important lessons.
{"title":"Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course","authors":"W. A. Conklin","doi":"10.1109/HICSS.2006.110","DOIUrl":"https://doi.org/10.1109/HICSS.2006.110","url":null,"abstract":"The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate depth of education. Active learning theory provides insight into methods of increasing skill development and retention through specific instructional methods. Applying active learning to a capstone course in information security centered around management of security in a business setting has been shown to be highly effective. Using a Cyber Defense Competition to provide a hands-on opportunity for students to test their skills and develop team based management skills in an operational business environment impacts many constituencies. Participating students learn in a true active learning environment. Instructors are able to evaluate the thoroughness of their curriculum in its intended setting. Other students learn as teams prepare for the competition. In the end, everyone feels they had learned important lessons.","PeriodicalId":432250,"journal":{"name":"Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133098794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}