Sciweavers

769 search results - page 51 / 154
» Action Research
Sort
View
ECIS
2003
13 years 10 months ago
Assessing the business consequences of systems risk
Both public media and IS research have produced a detailed view of different risks associated with computers. Measures to prevent systems risks from occurring are also well docume...
Hannu Salmela
FOCS
1991
IEEE
14 years 6 days ago
Computing Sums of Radicals in Polynomial Time
For sums of radicals Pk i=1 i di p i, where i; i are elements of some real algebraic number eld Q( ); di p i 2 R; we present a deterministic polynomial time algorithm to decide wh...
Johannes Blömer
ECOOP
2007
Springer
14 years 18 days ago
Why Don't People Use Refactoring Tools?
Tools that perform refactoring are currently under-utilized by programmers. As more advanced refactoring tools are designed, a great chasm widens between how the tools must be use...
Emerson R. Murphy-Hill, Andrew P. Black
CAINE
2003
13 years 10 months ago
Analysis Tool for Honeypot Systems
The increased utilization of the Internet and the larger number of computers connected to it has brought up a significant security problem. Hackers or crackers have attacked compu...
Terry Griffin
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
14 years 3 months ago
Leveraging the Wisdom of Crowds: Designing an IT-Supported Ideas Competition for an ERP Software Company
“Crowdsourcing” is currently one of the most discussed key words within the open innovation community. The major question for both research and business is how to find and lev...
Winfried Ebner, Jan Marco Leimeister, Ulrich Brets...