Sciweavers

2588 search results - page 177 / 518
» Project risk management
Sort
View
249
Voted
AMW
2011
14 years 7 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
127
Voted
LREC
2008
110views Education» more  LREC 2008»
15 years 5 months ago
Information Extraction Tools and Methods for Understanding Dialogue in a Companion
This paper discusses how Information Extraction is used to understand and manage Dialogue in the EU-funded Companions project. This will be discussed with respect to the Senior Co...
Roberta Catizone, Alexiei Dingli, Hugo Pinto, Yori...
ECIS
2004
15 years 4 months ago
What should the business know about information systems?
This paper presents an exploratory study of Information Systems (IS) competencies of business managers in Europe. Following resource-based theory and a knowledge-based view of IS ...
Salvador Aragon, Ryan R. Peterson
116
Voted
CHI
2008
ACM
16 years 3 months ago
Beyond the hype: sustainability & HCI
In this panel we explore: (1) the burgeoning discourse on sustainability concerns within HCI, (2) the material and behavioral challenges of sustainability in relation to interacti...
Lisa P. Nathan, Eli Blevis, Batya Friedman, Jay Ha...
101
Voted
HICSS
2008
IEEE
103views Biometrics» more  HICSS 2008»
15 years 10 months ago
Great Scrums Need Great Product Owners: Unbounded Collaboration and Collective Product Ownership
Scrum describes a separation of roles; the product owner is accountable for achieving business objectives and the team for technical execution. A pragmatic and collegial relations...
Ken H. Judy, Ilio Krumins-Beens