Sciweavers

2270 search results - page 293 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ECIS
2003
15 years 6 months ago
From e-business to knowledge e-trading
This paper aims to show investigations made in knowledge e-marketplaces (Ke-markets). It gathers, reviews, structures, and compiles in a homogeneous presentation information of th...
Emanuela Pauselli
ECIS
2003
15 years 6 months ago
The transformation of work in european banks: an analysis of IT skills
Researches that have recently investigated the impact of developments in Information Technologies (IT) on human capital in the banking industry analysed only marginally the evolut...
Paolo Neirotti, Emilio Paolucci
134
Voted
JFR
2008
148views more  JFR 2008»
15 years 4 months ago
Terrain-based vehicle orientation estimation combining vision and inertial measurements
A novel method for estimating vehicle roll, pitch and yaw using machine vision and inertial sensors is presented that is based on matching images captured from an on-vehicle camer...
Vishisht Gupta, Sean Brennan
MP
2002
110views more  MP 2002»
15 years 4 months ago
Robust optimization - methodology and applications
Abstract. Robust Optimization (RO) is a modeling methodology, combined with computational tools, to process optimization problems in which the data are uncertain and is only known ...
Aharon Ben-Tal, Arkadi Nemirovski
DB
2011
14 years 4 months ago
Open source software adoption: motivations of adopters and amotivations of non-adopters
Adoption of an information system could be reflected in two ways: through the adoption intentions of the non-adopters and the extent of adoption for the adopters. This study seeks...
Yan Li, Chuan-Hoo Tan, Heng Xu, Hock-Hai Teo