Sciweavers

14235 search results - page 2781 / 2847
» Is computer science science
Sort
View
133
Voted
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 9 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker
162
Voted
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
15 years 9 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
131
Voted
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Single Buyer-Single Supplier Bargaining Problem with Asymmetric Information - Theoretical Approach and Software Implementation
This paper is focused on the coordination of order and production policy between buyers and suppliers in supply chains. When a buyer and a supplier of an item work independently, ...
Eric Sucky
144
Voted
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 9 months ago
An Evaluation of Applying Use Cases to Construct Design versus Validate Design
Use case models capture and describe the functional requirements of a software system. A use case driven development process, where a use case model is the principal basis for con...
Erik Syversen, Bente Anda, Dag I. K. Sjøber...
139
Voted
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
15 years 9 months ago
Fifteen Years of GSS in the Field: A Comparison Across Time and National Boundaries
It has been over two decades since Group Support Systems (GSS) emerged on the Information Technology (IT) scene. GSS have now been commercialized and are present in an increasing ...
Gert-Jan de Vreede, Douglas R. Vogel, Gwendolyn L....
« Prev « First page 2781 / 2847 Last » Next »