Sciweavers

1885 search results - page 330 / 377
» Exploring design as a research activity
Sort
View
FC
2004
Springer
105views Cryptology» more  FC 2004»
15 years 5 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 5 months ago
The Effects of Time and Personality on the Productivity of Management Information Systems
The paper studies the relationship between information technology (IT), time personality and managerial productivity. Time personality is captured by concepts of polychronicity an...
Vladimir Kvassov
PROFES
2001
Springer
15 years 4 months ago
Building an Experience Base for Software Engineering: A Report on the First CeBASE eWorkshop
New information is obtained by research and disseminated by papers in conferences and journals. The synthesis of knowledge depends upon social discourse among the experts in a give...
Victor R. Basili
COLCOM
2009
IEEE
15 years 3 months ago
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
Mahendra Kumar, Richard E. Newman, José For...
ECAI
2008
Springer
15 years 1 months ago
Heuristics for Dynamically Adapting Propagation
Building adaptive constraint solvers is a major challenge in constraint programming. An important line of research towards this goal is concerned with ways to dynamically adapt th...
Kostas Stergiou