AMEND 发表于 2025-3-23 12:04:56

http://reply.papertrans.cn/88/8708/870776/870776_11.png

Assault 发表于 2025-3-23 16:19:58

Modelling and Simulation of Scrum Team Strategies: A Multi-agent Approach,ories, product backlog, sprint backlog, scrum team and sprints. Scrum team take user stories from product backlog into sprint backlog to start each sprint and deliver products at the end of each sprint. Sprint retrospective and review occurs at the end of each sprint to evaluate the delivered produc

Arteriography 发表于 2025-3-23 20:20:06

Development of a Scheme of a Hardware Accelerator of Quantum Computing for Correction Quantum Typestum theory of information, as well as a place in it of the concept of quantum entanglement. A technique has been developed for correcting two basic types of quantum errors, based on the implementation and implementation of certain quantum schemes. The main difficulties in ensuring the protection of

Incumbent 发表于 2025-3-23 23:27:43

Personalized Information Representation to Anonymous Users: Digital Signage Case,dual users. Such systems have to take care of user confidentiality and dynamically assess their interests. The paper developed earlier presented works on this topic and concentrates on the description of the ontological modeling of user interests and preferences as well as major components of such s

Conjuction 发表于 2025-3-24 05:31:03

Development of a Web Application of Facilitate Multidisciplinary Rehabilitation of Children with Clthe use of information and computer support in an integrated diagnostic system for patients with cleft lip and palate. In our research we aim to developed an autonomous web application that allows practitioners to determine the tactics of multidisciplinary diagnosis and treatment based on data integ

机制 发表于 2025-3-24 09:38:16

http://reply.papertrans.cn/88/8708/870776/870776_16.png

孤僻 发表于 2025-3-24 13:29:08

http://reply.papertrans.cn/88/8708/870776/870776_17.png

后退 发表于 2025-3-24 14:56:06

Comprehensive Intelligent Information Security Management System (CIISMS) for Supply Networks: Thethree blocks: technical, psychological and legal. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fluid

反叛者 发表于 2025-3-24 19:32:52

http://reply.papertrans.cn/88/8708/870776/870776_19.png

synovium 发表于 2025-3-25 00:59:53

http://reply.papertrans.cn/88/8708/870776/870776_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Software Engineering Perspectives in Intelligent Systems; Proceedings of 4th C Radek Silhavy,Petr Silhavy,Zdenka Prokopova Conference proce