Sciweavers

653 search results - page 13 / 131
» Factored Planning: How, When, and When Not
Sort
View
115
Voted
HICSS
2006
IEEE
110views Biometrics» more  HICSS 2006»
15 years 8 months ago
Risk Factors in Distributed Projects
In this manuscript we develop a conceptual understanding of how key risk factors associated with Information Technology development projects are magnified or multiplied when deali...
James M. Erickson, Roberto Evaristo
CSE
2009
IEEE
15 years 8 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...
GECCO
2011
Springer
264views Optimization» more  GECCO 2011»
14 years 5 months ago
Critical factors in the performance of novelty search
Novelty search is a recently proposed method for evolutionary computation designed to avoid the problem of deception, in which the fitness function guides the search process away...
Steijn Kistemaker, Shimon Whiteson
CHI
2010
ACM
15 years 8 months ago
A longitudinal study of how highlighting web content change affects people's web interactions
The Web is constantly changing, but most tools used to access Web content deal only with what can be captured at a single instance in time. As a result, Web users may not have a g...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling
ISPW
2010
IEEE
15 years 7 months ago
How to Welcome Software Process Improvement and Avoid Resistance to Change
Pressures for more complex products, customer dissatisfaction and problems related to cost and schedule overruns increase the need for effective management response and for improve...
Daniela Cristina Cascini Peixoto, Vitor A. Batista...