Sciweavers

184 search results - page 15 / 37
» Software Requirements Negotiation: Some Lessons Learned
Sort
View
CSCW
1994
ACM
13 years 11 months ago
From Implementation to Design: Tailoring and the Emergence of Systematization in CSCW
In this paper, we look at how people working in a governmental labor inspection agency tailor their shared PC environment. Starting with standard off-the-shelf software, the tailo...
Randall H. Trigg, Susanne Bødker
IJEB
2007
127views more  IJEB 2007»
13 years 7 months ago
Factors mediating the routinisation of e-learning within a traditional university education environment
Technology-enhanced or Computer Aided Learning (e-learning) can be institutionally integrated and supported by learning management systems or Virtual Learning Environments (VLEs) ...
Shafqat Hameed, John Mellor, Atta Badii, Niyati Pa...
OOPSLA
2004
Springer
14 years 26 days ago
An aspect-oriented generative approach
Generative programming and aspect-oriented software development have been proposed over the last years aiming at increasing maintainability and reusability of software systems. Wh...
Uirá Kulesza, Alessandro F. Garcia, Carlos ...
PAKDD
2005
ACM
103views Data Mining» more  PAKDD 2005»
14 years 1 months ago
Subgroup Discovery Techniques and Applications
This paper presents the advances in subgroup discovery and the ways to use subgroup discovery to generate actionable knowledge for decision support. Actionable knowledge is explici...
Nada Lavrac
IJDE
2002
82views more  IJDE 2002»
13 years 7 months ago
Practical Approaches to Recovering Encrypted Digital Evidence
As more criminals use encryption to conceal incriminating evidence, forensic examiners require practical methods for recovering some or all of the encrypted data. This paper prese...
Eoghan Casey