Sciweavers

46 search results - page 1 / 10
» A Longitudinal Analysis of GSS Use in the Case Method Classr...
Sort
View
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
13 years 9 months ago
A Longitudinal Analysis of GSS Use in the Case Method Classroom
This exploratory study reports on term-long use of a discussion-based GSS by 137 undergraduate business students in a case-based core MIS course. We develop a model of student par...
Michael Parent, Derrick J. Neufeld, R. Brent Gallu...
DGO
2003
140views Education» more  DGO 2003»
13 years 6 months ago
Social Welfare Program Administration and Evaluation and Policy Analysis Using Knowledge Discovery and Data Mining (KDD) on Admi
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...
ISSTA
2006
ACM
13 years 10 months ago
The case for analysis preserving language transformation
Static analysis has gained much attention over the past few years in applications such as bug finding and program verification. As software becomes more complex and componentize...
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Web...
CCS
2008
ACM
13 years 6 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
IFIP
2001
Springer
13 years 9 months ago
Cultivating Recalcitrance in Information Systems Research
There is an ongoing debate about how to improve the quality of empirical research efforts in information systems. One of the persistent issues within the debate concerns the relat...
Carsten Sørensen, Edgar A. Whitley, Shirin ...