A简洁的 发表于 2025-3-23 12:43:32

Agile-Similar Approach Based on Project Crashing to Manage Research Projectsects should be managed (e.g. [.]). They analyse if it is better to use traditional project management (TPM) or agile project management (APM). In this paper we propose agile-similar approach based on project crashing and stakeholder analysis to manage research project. First we present a theoretical

cravat 发表于 2025-3-23 16:12:44

Guidelines for Web Application Designers: A Meta-Model, a Grammar, and a Tool make good decisions regarding the content of the web application, the navigation schema, and/or the presentation of information. Literature provides them with many guidelines for these tasks. However this knowledge is disseminated in many sources and not structured. In this paper, we perform a know

尾随 发表于 2025-3-23 19:38:21

http://reply.papertrans.cn/32/3115/311477/311477_13.png

Minatory 发表于 2025-3-24 01:23:27

http://reply.papertrans.cn/32/3115/311477/311477_14.png

contradict 发表于 2025-3-24 04:16:48

http://reply.papertrans.cn/32/3115/311477/311477_15.png

有帮助 发表于 2025-3-24 07:26:09

The Stuttgart IT Architecture for Manufacturingand mobile integration of human workers into the smart production environment and because it includes concrete recommendations for technologies to implement it, thus filling a granularity gap between conceptual and case-based architectures. To illustrate the benefits of the SITAM’s prototypical impl

起来了 发表于 2025-3-24 13:40:14

Pivot-Based Similarity Wide-Joins Fostering Near-Duplicate Detectionto surpass its restrictions and provides an efficient algorithm based on pivots that speeds up the entire process, whereas enabling to retrieve the most similar elements in a single-pass. We also investigate alternatives and propose efficient algorithms to choose the pivots. Experiments using real d

经典 发表于 2025-3-24 18:43:15

A New Mechanism to Preserving Data Confidentiality in Cloud Database Scenariosider. Therefore, data confidentiality is an important concern from cloud service providers. Recently, three main approaches have been introduced to ensure data confidentiality in cloud services: data encryption; combination of encryption and fragmentation; and fragmentation. Besides, other strategie

被告 发表于 2025-3-24 19:27:21

Investigating the Identification of Technical Debt Through Code Comment Analysisof technical debt by participants. The results indicated that CVM-TD provided promising results considering the accuracy values. English reading skills have an impact on the TD detection process. We could not conclude that the experience level affects this process. We identified a list of the 20 mos

obligation 发表于 2025-3-25 03:02:18

http://reply.papertrans.cn/32/3115/311477/311477_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Enterprise Information Systems; 18th International C Slimane Hammoudi,Leszek A. Maciaszek,José Cordeiro Conference proceedings 2017 Springe