標(biāo)題: Titlebook: Advanced Information Systems Engineering Workshops; CAiSE 2021 Internati Artem Polyvyanyy,Stefanie Rinderle-Ma Conference proceedings 2021 [打印本頁(yè)] 作者: monster 時(shí)間: 2025-3-21 20:09
書(shū)目名稱(chēng)Advanced Information Systems Engineering Workshops影響因子(影響力)
書(shū)目名稱(chēng)Advanced Information Systems Engineering Workshops影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Advanced Information Systems Engineering Workshops網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Advanced Information Systems Engineering Workshops網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Advanced Information Systems Engineering Workshops被引頻次
書(shū)目名稱(chēng)Advanced Information Systems Engineering Workshops被引頻次學(xué)科排名
書(shū)目名稱(chēng)Advanced Information Systems Engineering Workshops年度引用
書(shū)目名稱(chēng)Advanced Information Systems Engineering Workshops年度引用學(xué)科排名
書(shū)目名稱(chēng)Advanced Information Systems Engineering Workshops讀者反饋
書(shū)目名稱(chēng)Advanced Information Systems Engineering Workshops讀者反饋學(xué)科排名
作者: gout109 時(shí)間: 2025-3-21 22:03
Advanced Information Systems Engineering WorkshopsCAiSE 2021 Internati作者: 門(mén)窗的側(cè)柱 時(shí)間: 2025-3-22 03:13 作者: faddish 時(shí)間: 2025-3-22 07:31 作者: 銼屑 時(shí)間: 2025-3-22 08:48 作者: 無(wú)動(dòng)于衷 時(shí)間: 2025-3-22 15:52
Usability Evaluation of Business Process Modeling Standards – BPMN and BORM Case Studytinuous at the .-node with respect to that metric. Thus, we can invoke the theory of Section 6.7 to conclude that node voltages converge as the vicinity contracts. No longer do we need an extended argument to obtain those convergences.作者: 噱頭 時(shí)間: 2025-3-22 17:53
TrustSECO: A Distributed Infrastructure for Providing Trust in the Software Ecosystemotection by design, or (3) having no legal benefits. Two concrete case studies should provide a blueprint on how to apply the test. We hope that this chapter also contributes to an interdisciplinary discussion of MPC certification and standardization.作者: 溝通 時(shí)間: 2025-3-22 22:19 作者: 集聚成團(tuán) 時(shí)間: 2025-3-23 01:51
Real-Time Equipment Health State Prediction with LSTM Networks and Bayesian Inferencend meaningful results while also providing flexibility and reducing regulatory costs, will work better in the privacy context. The chapter concludes that environmental covenants and environmental management systems can be adapted to protect personal information. An emission fee approach can be used to combat spam effectively.作者: Indicative 時(shí)間: 2025-3-23 07:23 作者: 圍巾 時(shí)間: 2025-3-23 10:50 作者: mutineer 時(shí)間: 2025-3-23 14:51
Values in Design Methodologies for AIvin?.cing analysis on the importance of rehabilitation, giving consideration to police registers and the storage and maintenance of criminal records by the police and their possible future use. A diverse invest978-3-319-87901-7978-3-319-64912-2作者: vitreous-humor 時(shí)間: 2025-3-23 19:45
XAI-KG: Knowledge Graph to Support XAI and Decision-Making in Manufacturing that racial integration was supported by a supermajority consensus. Thus . serves as a model for the developmental supplementation decisions reached in late twentieth- and early twenty-first-century privacy cases.作者: Anticoagulants 時(shí)間: 2025-3-23 22:46
as a whole, were less likely to forecast a rearrest, and less likely to conceal their criminal record on applications. Implications of the findings for prisoner reintegration policy and practice are discussed.作者: 粉筆 時(shí)間: 2025-3-24 05:40 作者: 進(jìn)取心 時(shí)間: 2025-3-24 10:13
Explanation in Multi-Stakeholder Recommendation for Enterprise Decision Support Systemsjustice. This would be our destiny, if only we did not lose our confidence. But as we enter late modernity those aspirations do not appear to have been fully realized. Instead we are confronted daily with multiple injustices, inequalities, segregation and significantly, the increased use of incarceration.作者: lactic 時(shí)間: 2025-3-24 11:38 作者: 谷類(lèi) 時(shí)間: 2025-3-24 15:10
Ontology-Driven Audit Using the REA-Ontologyacy and public accessibility, and propose novel ideas on the how and why of online privacy. .The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and 作者: IRATE 時(shí)間: 2025-3-24 21:59
l consumer harm or market failure that could justify burdensome government regulation of online privacy. It describes the tremendous advantages consumers currently receive from the free flow of information collected on- line, advantages which could be eliminated if the government unnecessarily regulates and s978-1-4613-5694-3978-1-4615-1719-1作者: FLASK 時(shí)間: 2025-3-25 00:23 作者: 減震 時(shí)間: 2025-3-25 06:56 作者: 船員 時(shí)間: 2025-3-25 08:25 作者: 譏笑 時(shí)間: 2025-3-25 13:19 作者: Cryptic 時(shí)間: 2025-3-25 18:28 作者: 6Applepolish 時(shí)間: 2025-3-25 22:44
978-3-030-79021-9Springer Nature Switzerland AG 2021作者: Foreknowledge 時(shí)間: 2025-3-26 00:11 作者: critique 時(shí)間: 2025-3-26 06:07 作者: Chameleon 時(shí)間: 2025-3-26 11:32 作者: 洞穴 時(shí)間: 2025-3-26 16:02 作者: Munificent 時(shí)間: 2025-3-26 18:14
https://doi.org/10.1007/978-3-642-03814-3ools of remote communication, such as Skype, Google meets or today’s most popular software from Microsoft - MS Teams. Since we primarily teach agile project management using practical methods, specifically games, it was necessary to invent and design a game that can be played through remote communic作者: 歡呼 時(shí)間: 2025-3-26 23:01
Group Expertise In Legal Decision Makingignation to the accuracy and quality of meeting user requirements. However, it is apparent that the tasks of requirements engineering are taken lightly or often overlooked in agile projects due to project cost. One of the main reasons for this is the lack of efficient and easy to use modelling tools作者: 錢(qián)財(cái) 時(shí)間: 2025-3-27 02:06
Personal Expertise in Legal Decision Makingide explanations in the scenario of Multi-Stakeholder Recommendation where the sensible information of one stakeholder should not be disclosed in the explanation to another stakeholder. Among the several types of explanations analyzed, counterfactual explanations come off best as they allow the syst作者: indecipherable 時(shí)間: 2025-3-27 05:20 作者: 彎曲的人 時(shí)間: 2025-3-27 11:03 作者: MORPH 時(shí)間: 2025-3-27 16:58
https://doi.org/10.1007/978-981-33-4623-9enrichment potential in relation to sentences of textual functional requirements specification. Our motivation is to reduce the incompleteness of requirements that may be a source of inconsistency. We found there are some facts and rules so obvious for domain experts that they do not even mention th作者: Monocle 時(shí)間: 2025-3-27 19:31
https://doi.org/10.1007/978-981-33-4623-9cademy. Speaking about agility, we basically mean various kinds of automation. A higher degree of automation results in a more agile enterprise. However, in practice, even in the case of complete automation of the enterprise, there remains a need for user interaction with various software systems. T作者: 兵團(tuán) 時(shí)間: 2025-3-28 00:35 作者: Delirium 時(shí)間: 2025-3-28 03:01 作者: Benzodiazepines 時(shí)間: 2025-3-28 09:32 作者: 壁畫(huà) 時(shí)間: 2025-3-28 13:43
https://doi.org/10.1007/978-981-33-4623-9 approach can clarify issues of both theory and practice. One such approach is Value Sensitive Design (VSD), an established theory for addressing issues of values in a systematic and principled fashion in the design of information technology. However, it is unclear how VSD is translated into current作者: pessimism 時(shí)間: 2025-3-28 17:15
Nineteenth-Century Major Lives and Lettershe capabilities of predicting abnormal behaviours in (near) real-time. However, existing algorithms in predictive maintenance suffer from several limitations related to their scalability, efficiency, and reliability preventing their wide application to various industries. This paper proposes an appr作者: left-ventricle 時(shí)間: 2025-3-28 20:57 作者: 可能性 時(shí)間: 2025-3-29 02:30
economic or societal barriers. Given that formerly incarcerated persons already must overcome a host of barriers to successfully reenter society from prison, an interesting and unanswered question concerns whether or not formerly incarcerated persons’ believe in the American Dream, and the implicat作者: 范例 時(shí)間: 2025-3-29 03:48 作者: 障礙 時(shí)間: 2025-3-29 08:07
Agile Game in Online Environmentto those individuals identified in articles 1, 2, and 3 of the Fourth Hague Convention of October 1907. The first of these articles set out the requirements which had to be fulfilled by any army or militia/volunteer corps whose soldiers wished, in case of capture by enemy forces, to be considered pr作者: CLOUT 時(shí)間: 2025-3-29 14:28
Filling the Gap Between Business and Application Development Using Agile BORMt outlines the tribunals’ detention regimes, thereby focusing on the legal position of detained persons. First, this requires examining the tribunals’ own legal frameworks. Second, the exceptions to the regular detention regimes are considered. These exceptions concern, on the one hand, the modifica作者: voluble 時(shí)間: 2025-3-29 19:06
Explanation in Multi-Stakeholder Recommendation for Enterprise Decision Support Systemsen a rather peculiar image of the relationship of mankind and the world became possible. First, confined to a small group of intellectuals, then gradually spreading to larger groups of people, modernity is based on the belief that social order is a human creation. Society is a human artifact. Fittin作者: grudging 時(shí)間: 2025-3-29 23:06 作者: 墊子 時(shí)間: 2025-3-30 02:11
Problem of Semantic Enrichment of Sentences Used in Textual Requirements Specificationhas been affected by governmental inconsistency towards the penal process and its purposes. Effects of media treatment of crime and criticism of prisons identified. Culture of antagonistic and militant industrial relations within the Prison Service affected reform, management, and progressive develo作者: Culmination 時(shí)間: 2025-3-30 07:30
Adapting Domain-Specific Interfaces Using Invariants Mechanisms of controversy and discussion among sociologists. Throughout this article, the intersections among crime, prison, race, ethnicity, and state are examined, revealing that the state has a central role in the reproduction and production of social inequalities and direct criminalization of certain ethn作者: ATRIA 時(shí)間: 2025-3-30 09:50
Usability Evaluation of Business Process Modeling Standards – BPMN and BORM Case Study7]. In this case, the principle reason is the following. In [34], the idea of a random walker passing through a transfinite .-node was developed recursively by shorting the branches in a small region around that .-node—thereby achieving a decrease in rank—then applying the theory for a lower rank of作者: nepotism 時(shí)間: 2025-3-30 15:33 作者: Obverse 時(shí)間: 2025-3-30 19:13
Ontology-Driven Audit Using the REA-Ontology, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they w作者: 柔美流暢 時(shí)間: 2025-3-30 22:17
TrustSECO: A Distributed Infrastructure for Providing Trust in the Software Ecosystemtechnologies promise to fulfill both goals simultaneously. A particularly effective and versatile technology solution is multi-party computation (MPC). It allows protecting data during a computation involving multiple parties..This chapter aims for a better understanding of the role of MPC in the GD作者: 秘方藥 時(shí)間: 2025-3-31 03:34
e personal data. In this chapter, we argue that privacy interfaces shall incorporate the context of display, personal preferences, and individual competences of data subjects following the principles of universal design and usable privacy. Doing so requires—among others—to consciously decouple the p作者: 不法行為 時(shí)間: 2025-3-31 08:22
Values in Design Methodologies for AIples.Offers a much-needed comparison into historical and con.This book offers a comparison of the differences between the ‘public’ and ‘private’ spheres, and questions the need for law enforcement to intrude upon both. ?Beginning with the origins of the concept of privacy, before addressing more cur