找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Enterprise Information Systems; 18th International C Slimane Hammoudi,Leszek A. Maciaszek,José Cordeiro Conference proceedings 2017 Springe

[复制链接]
楼主: 召集会议
发表于 2025-3-23 12:43:32 | 显示全部楼层
Agile-Similar Approach Based on Project Crashing to Manage Research Projectsects should be managed (e.g. [.]). They analyse if it is better to use traditional project management (TPM) or agile project management (APM). In this paper we propose agile-similar approach based on project crashing and stakeholder analysis to manage research project. First we present a theoretical
发表于 2025-3-23 16:12:44 | 显示全部楼层
Guidelines for Web Application Designers: A Meta-Model, a Grammar, and a Tool make good decisions regarding the content of the web application, the navigation schema, and/or the presentation of information. Literature provides them with many guidelines for these tasks. However this knowledge is disseminated in many sources and not structured. In this paper, we perform a know
发表于 2025-3-23 19:38:21 | 显示全部楼层
发表于 2025-3-24 01:23:27 | 显示全部楼层
发表于 2025-3-24 04:16:48 | 显示全部楼层
发表于 2025-3-24 07:26:09 | 显示全部楼层
The Stuttgart IT Architecture for Manufacturingand mobile integration of human workers into the smart production environment and because it includes concrete recommendations for technologies to implement it, thus filling a granularity gap between conceptual and case-based architectures. To illustrate the benefits of the SITAM’s prototypical impl
发表于 2025-3-24 13:40:14 | 显示全部楼层
Pivot-Based Similarity Wide-Joins Fostering Near-Duplicate Detectionto surpass its restrictions and provides an efficient algorithm based on pivots that speeds up the entire process, whereas enabling to retrieve the most similar elements in a single-pass. We also investigate alternatives and propose efficient algorithms to choose the pivots. Experiments using real d
发表于 2025-3-24 18:43:15 | 显示全部楼层
A New Mechanism to Preserving Data Confidentiality in Cloud Database Scenariosider. Therefore, data confidentiality is an important concern from cloud service providers. Recently, three main approaches have been introduced to ensure data confidentiality in cloud services: data encryption; combination of encryption and fragmentation; and fragmentation. Besides, other strategie
发表于 2025-3-24 19:27:21 | 显示全部楼层
Investigating the Identification of Technical Debt Through Code Comment Analysisof technical debt by participants. The results indicated that CVM-TD provided promising results considering the accuracy values. English reading skills have an impact on the TD detection process. We could not conclude that the experience level affects this process. We identified a list of the 20 mos
发表于 2025-3-25 03:02:18 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-17 22:44
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表