Sciweavers

2588 search results - page 166 / 518
» Project risk management
Sort
View
181
Voted
HRI
2011
ACM
14 years 7 months ago
Social robotic telepresence
This paper describes a methodology for performing longitudinal evaluations when a social robotic telepresence system is deployed in realistic environments. This work is the core o...
Silvia Coradeschi, Amy Loutfi, Annica Kristofferss...
178
Voted
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 10 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
121
Voted
INFSOF
2008
117views more  INFSOF 2008»
15 years 3 months ago
An empirical investigation of the drivers of software outsourcing decisions in Japanese organizations
Although Japan represents the single largest Asian market and 10% of the global software outsourcing market, little is understood about how Japanese companies make software projec...
Ashley A. Bush, Amrit Tiwana, Hiroshi Tsuji
109
Voted
ITICSE
2010
ACM
15 years 8 months ago
Skills and knowledge for hire: leeds source-it
We present a pilot for a student consultancy service offering students the opportunity to work with internal and external clients on real life projects to learn and enhance trans...
Royce Neagle, Alison Marshall, Roger Boyle
106
Voted
IEEEARES
2007
IEEE
15 years 9 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul