AMEND 发表于 2025-3-23 12:04:56
http://reply.papertrans.cn/88/8708/870776/870776_11.pngAssault 发表于 2025-3-23 16:19:58
Modelling and Simulation of Scrum Team Strategies: A Multi-agent Approach,ories, product backlog, sprint backlog, scrum team and sprints. Scrum team take user stories from product backlog into sprint backlog to start each sprint and deliver products at the end of each sprint. Sprint retrospective and review occurs at the end of each sprint to evaluate the delivered producArteriography 发表于 2025-3-23 20:20:06
Development of a Scheme of a Hardware Accelerator of Quantum Computing for Correction Quantum Typestum theory of information, as well as a place in it of the concept of quantum entanglement. A technique has been developed for correcting two basic types of quantum errors, based on the implementation and implementation of certain quantum schemes. The main difficulties in ensuring the protection ofIncumbent 发表于 2025-3-23 23:27:43
Personalized Information Representation to Anonymous Users: Digital Signage Case,dual users. Such systems have to take care of user confidentiality and dynamically assess their interests. The paper developed earlier presented works on this topic and concentrates on the description of the ontological modeling of user interests and preferences as well as major components of such sConjuction 发表于 2025-3-24 05:31:03
Development of a Web Application of Facilitate Multidisciplinary Rehabilitation of Children with Clthe use of information and computer support in an integrated diagnostic system for patients with cleft lip and palate. In our research we aim to developed an autonomous web application that allows practitioners to determine the tactics of multidisciplinary diagnosis and treatment based on data integ机制 发表于 2025-3-24 09:38:16
http://reply.papertrans.cn/88/8708/870776/870776_16.png孤僻 发表于 2025-3-24 13:29:08
http://reply.papertrans.cn/88/8708/870776/870776_17.png后退 发表于 2025-3-24 14:56:06
Comprehensive Intelligent Information Security Management System (CIISMS) for Supply Networks: Thethree blocks: technical, psychological and legal. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fluid反叛者 发表于 2025-3-24 19:32:52
http://reply.papertrans.cn/88/8708/870776/870776_19.pngsynovium 发表于 2025-3-25 00:59:53
http://reply.papertrans.cn/88/8708/870776/870776_20.png