florid 发表于 2025-3-23 12:18:54

http://reply.papertrans.cn/89/8851/885009/885009_11.png

慢跑 发表于 2025-3-23 14:50:30

http://reply.papertrans.cn/89/8851/885009/885009_12.png

condemn 发表于 2025-3-23 19:41:11

http://reply.papertrans.cn/89/8851/885009/885009_13.png

随意 发表于 2025-3-24 01:12:18

Assessing Risk Estimations for Cyber-Security Using Expert Judgmentunknown and uncertain values using multiple experts and combining these judgments by weighing the experts based on their performance. The performance of an expert is assessed using the information and calibration score calculated from the judgments of calibration questions. The judgments are stated

CLAN 发表于 2025-3-24 06:15:14

Separation of Concerns in Process Compliance Checking: Divide-and-Conquerthe safety-critical context. To facilitate this task, we propose a method for automated process compliance checking that can be used as a basis for decision making. Our method requires users to create a knowledge base of formalized requirements and processes checkable for compliance. In this paper,

脾气暴躁的人 发表于 2025-3-24 07:21:26

The Value of a Net Promoter Score in Driving a Company’s Bottom Line: A Single-Case Study from IBM Tit to drive customer multiplication. There is a vast range of academic research that details both the positive impacts and practicalities of NPS and certain instances where NPS would not be applicable. Research indicates that, although NPS isn’t necessarily related to the results or success of a bus

BOGUS 发表于 2025-3-24 13:15:29

Recognising the Types of Software Assets and Its Impact on Asset Reusece. Some commentators even called for the end of the reuse..This paper examines what can be reused and how. Interviews indicated the need for a more precise asset definition and an enhanced asset description. It is suggested that identified types of assets should be treated individually, thus increa

陶器 发表于 2025-3-24 16:14:47

Exploring Technology Acceptance and Planned Behaviour by the Adoption of Predictive HR Analytics Dururces analytics during recruitment. Additionally, this paper discusses the identification of dishonest behaviour to increase the job offer success during algorithm-based data screening. In the age of digital transformation, researchers and practitioners explore the possibilities of predictive analyt

保守 发表于 2025-3-24 22:40:33

http://reply.papertrans.cn/89/8851/885009/885009_19.png

–FER 发表于 2025-3-25 00:33:42

Cross Fertilization in Software Engineeringem. More in particular by focusing on specific technologies, author will overview bidirectional relationships between two of the most promising technologies nowadays namely: blockchain and machine learning.
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Systems, Software and Services Process Improvement; 27th European Confer Murat Yilmaz,Jörg Niemann,Richard Messnarz Conference proceedings