Sciweavers

890 search results - page 55 / 178
» Comparative expert reviews
Sort
View
ECIS
2003
15 years 2 months ago
E-negotiations: towards engineering of technology-based social processes
Traditionally, negotiation support was based on normative and prescriptive research; its users were analysts and experts. The purpose of the recently developed e-negotiation syste...
Gregory E. Kersten
ISI
2008
Springer
15 years 24 days ago
Using "Cited by" Information to Find the Context of Research Papers
This paper proposes a novel method of analyzing data to find important information about the context of research papers. The proposed CCTVA (Collecting, Cleaning, Translating, Visu...
Chun-Hung Lu, Chih-Chien Wang, Min-Yuh Day, Chorng...
110
Voted
JCP
2008
116views more  JCP 2008»
15 years 23 days ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
128
Voted
OIR
2007
123views more  OIR 2007»
15 years 9 days ago
The IP's guide to the galaxy of portal planning: part III - administrative framework
Purpose – This article is the third in a four-part series that aims to illustrate the process involved in planning a portal and creating a portal definition document. Design/me...
Amy M. Finley, Rebecca H. Augustyniak
82
Voted
ESWA
2010
136views more  ESWA 2010»
14 years 11 months ago
Case-based adaptation for automotive engine electronic control unit calibration
The automotive engine performance is greatly affected by the calibration of its electronic control unit (ECU). The method for ECU calibration is traditionally done by trial-and-er...
Chi-Man Vong, Pak-Kin Wong