Sciweavers

535 search results - page 75 / 107
» Do we need dependent types
Sort
View
SAC
2009
ACM
14 years 9 days ago
Management of requirements in ERP development: a comparison between proprietary and open source ERP
Identification and specification of business requirements are extremely important when development of Enterprise Resource Planning systems (ERPs) take place. It can be stated that...
Björn Johansson, Rogério Atem de Carva...
ECTEL
2009
Springer
14 years 8 days ago
Getting to Know Your User - Unobtrusive User Model Maintenance within Work-Integrated Learning Environments
Work-integrated learning (WIL) poses unique challenges for user model design: on the one hand users’ knowledge levels need to be determined based on their work activities – tes...
Stefanie N. Lindstaedt, Günter Beham, Barbara...
DAMON
2006
Springer
13 years 11 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 6 months ago
Liquidity in Credit Networks: A Little Trust Goes a Long Way
Credit networks represent a way of modeling trust between entities in a network. Nodes in the network print their own currency and trust each other for a certain amount of each ot...
Pranav Dandekar, Ashish Goel, Ramesh Govindan, Ian...
BMCBI
2010
133views more  BMCBI 2010»
13 years 7 months ago
Consolidating metabolite identifiers to enable contextual and multi-platform metabolomics data analysis
Background: Analysis of data from high-throughput experiments depends on the availability of well-structured data that describe the assayed biomolecules. Procedures for obtaining ...
Henning Redestig, Miyako Kusano, Atsushi Fukushima...