Sciweavers

3555 search results - page 118 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 8 months ago
Breaching the Knowledge Transfer Blockade in IT Offshore Outsourcing Projects - A Case from the Financial Services Industry
In this paper the authors present the results of a research project that strives to fill a literature gap in IT offshore outsourcing research by analyzing clientside managerial me...
Robert Gregory, Roman Beck, Michael Prifling
HICSS
2008
IEEE
97views Biometrics» more  HICSS 2008»
15 years 8 months ago
Social Network Analysis as a Tool to Evaluate the Effectiveness of EC Funded Networks of Excellence: The Case of DEMO-net
The European Commission, through its Framework Programme aims to stimulate the development of sustained collaborative research networks across Europe. Social network analysis (SNA...
Kathy Buckner, Peter Cruickshank
FLAIRS
2004
15 years 2 months ago
Identifying Critical Factors in Case-Based Prediction
A reversible outcome is one that can be changed. For example, the failure of an ongoing project may be avoided if certain actions are taken, while an outcome such as the path of a...
Rosina Weber, William M. Evanco, Michael Waller, J...
CHI
2009
ACM
16 years 2 months ago
Leveraging open-source software in the design and development process
This paper presents a case study of the NASA Ames Research Center HCI Group's design and development of a problem reporting system for NASA's next generation vehicle (to...
Collin Green, Irene Tollinger, Christian Ratterman...
AML
2005
58views more  AML 2005»
15 years 1 months ago
Successors of singular cardinals and coloring theorems I
In this paper, we investigate the extent to which techniques used in [10], [2], and [3] -- developed to prove coloring theorems at successors of singular cardinals of uncountable c...
Todd Eisworth, Saharon Shelah