Sciweavers

308 search results - page 54 / 62
» Participatory Design in Consulting
Sort
View
93
Voted
COMSIS
2007
80views more  COMSIS 2007»
14 years 10 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
MANSCI
2008
68views more  MANSCI 2008»
14 years 10 months ago
Queuing for Expert Services
We consider a monopolist expert offering a service with a `credence' characteristic. A credence service is one where the customer cannot verify, even after a purchase, whethe...
Laurens G. Debo, L. Beril Toktay, Luk N. Van Wasse...
FAC
2007
170views more  FAC 2007»
14 years 10 months ago
Are the Logical Foundations of Verifying Compiler Prototypes Matching user Expectations?
Abstract. The Verifying Compiler (VC) project proposals suggest that mainstream software developers are its targeted end-users. Like other software engineering efforts, the VC proj...
Patrice Chalin
79
Voted
KBS
2007
100views more  KBS 2007»
14 years 10 months ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
HUC
2010
Springer
14 years 8 months ago
Exploring inter-child behavioral relativity in a shared social environment: a field study in a kindergarten
A kindergarten is an interesting community of young children. The children continuously share their interactions and experiences, and grow along similar developmental stages. In t...
Inseok Hwang, Hyukjae Jang, Lama Nachman, Junehwa ...