Sciweavers

1422 search results - page 196 / 285
» Information security and risk management
Sort
View
ICRA
2005
IEEE
173views Robotics» more  ICRA 2005»
14 years 3 months ago
Decision Networks for Repair Strategies in Speech-Based Interaction with Mobile Tour-Guide Robots
– The main task of a voice-enabled tour-guide robot in mass exhibition setting is to engage visitors in dialogue and provide as much exhibit information as possible in a limited ...
Plamen J. Prodanov, Andrzej Drygajlo
ERLANG
2008
ACM
13 years 12 months ago
Testing Erlang data types with quviq quickcheck
When creating software, data types are the basic bricks. Most of the time a programmer will use data types defined in library modules, therefore being tested by many users over ma...
Thomas Arts, Laura M. Castro, John Hughes
MSOM
2010
77views more  MSOM 2010»
13 years 8 months ago
To Wave or Not to Wave? Order Release Policies for Warehouses with an Automated Sorter
Wave-based release policies are prevalent in warehouses with an automated sorter, and take different forms depending on how much waves overlap and whether the sorter is split for...
Jérémie Gallien, Théophane We...
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
14 years 4 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
14 years 4 months ago
The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment
ABSTRACT. Risks associated with change in technology standards and uncertainty over the sharing of costs and benefits among trading partners impede interorganizational information ...
Frederick J. Riggins, Kelly T. Slaughter