Sciweavers

565 search results - page 43 / 113
» A Study on Successful Business Intelligence Systems in Pract...
Sort
View
AUSAI
2010
Springer
15 years 14 days ago
Pushing the Envelope: General Game Players Prove Theorems
A general game player is a system that can play previously unknown games given nothing but their rules. A key to success in this endeavour is the ability to automatically gain know...
Sebastian Haufe, Michael Thielscher
AAMAS
2002
Springer
15 years 1 months ago
Stochastic Simulation of Inherited Kinship-Driven Altruism
The aim of this research is to assess the r^ole of a hypothetical inherited feature (gene) promoting altruism between relatives as a factor for survival in the context of a multi-...
Heather Turner, Dimitar Kazakov
HICSS
1999
IEEE
78views Biometrics» more  HICSS 1999»
15 years 5 months ago
A Structured Transformation Approach for Legacy Information Systems - A Cash Receipts/Reimbursements Example
Legacy information systems are difficult to transform into the new or upgraded information systems. Part of the reason is being the incompatibility and the unscalability between t...
Jia-Lang Seng, Wayne Tsai
ICEIS
2007
IEEE
15 years 3 months ago
An information systems auditor's profile
The increasing dependence upon Information systems in the last few decades by businesses has resulted in concerns regarding auditing. IS auditing has changed from auditing “arou...
Mariana Carroll, Alta van der Merwe
STANDARDVIEW
1998
71views more  STANDARDVIEW 1998»
15 years 1 months ago
Network externalities in software systems
Network externalities are the effects on the value of a product that can be ascribed to the presence of a network of users of such product. They play an essential role in the busi...
Giancarlo Succi, Paolo Predonzani, Andrea Valerio,...