Sciweavers

315 search results - page 47 / 63
» Claims Analysis
Sort
View
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 3 months ago
Detecting Coordination Problems in Collaborative Software Development Environments
Software development is rarely an individual effort and generally involves teams of developers collaborating to generate good reliable code. Among the software code there exist te...
Chintan Amrit, Jos van Hillegersberg
IJMMS
2008
90views more  IJMMS 2008»
15 years 3 months ago
Pair programming and the mysterious role of the navigator
Computer programming is generally understood to be highly challenging and since its inception a wide range of approaches, tools and methodologies have been developed to assist in ...
Sallyann Bryant, Pablo Romero, Benedict du Boulay
JIS
2008
134views more  JIS 2008»
15 years 3 months ago
The quality of evidence in knowledge management research: practitioner versus scholarly literature
The fragmentation of knowledge management (KM) as a field and as an area of research poses serious theoretical challenges for researchers. The viability of KM rests on how the com...
Hamid R. Ekbia, Noriko Hara
146
Voted
JTAER
2008
100views more  JTAER 2008»
15 years 3 months ago
Securing Uniqueness of Rights e-Documents: A Deontic Process Perspective
We typically think of documents as carrying information. However, certain kinds of documents do more than that: they are not only informative but also performative in that they re...
Ronald M. Lee, Vu Nguyen, Anastasia Pagnoni
TIFS
2008
145views more  TIFS 2008»
15 years 3 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler