Search results
Jump to navigation
Jump to search
- The conference addresses critical issues related to diversity. Proposals on all relevant topics are welcome, ...ry, cultural studies, culture, globalisation, interdisciplinary, learning, management, globalization, social justice, race, ethnicity, gender, education, multidi932 bytes (103 words) - 13:14, 17 February 2021
- | Acronym = SPECIAL ISSUE ON MISSION CRITICAL NETWOR 2009 | Title = JSAC CALL FOR PAPERS SPECIAL ISSUE ON MISSION CRITICAL NETWORKING5 KB (549 words) - 14:06, 17 February 2021
- ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to the following topics list: Knowledge Management and Engineering3 KB (332 words) - 13:16, 17 February 2021
- * Foundations and conceptual studies of and for agile methods * Empirical studies and experiences2 KB (230 words) - 13:43, 17 February 2021
- |Field=Critical Management Studies ...d differentiations); procedurisation of innovation; meaning and utility of management standards both online and offline; sophistication of managerial control and5 KB (638 words) - 13:11, 17 February 2021
- ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to: knowledge management and engineering,4 KB (463 words) - 12:22, 17 February 2021
- |Title=The First International Workshop on the Critical Computer Based Systems ...practical results relevant to the engineering of highly sophisticated and critical systems that are used in automotive, avionics, railway, naval, chemical, nu5 KB (660 words) - 13:17, 17 February 2021
- | Title = ACM First International Workshop on Data-intensive Software Management and Mining Data-intensive Software Management and Mining4 KB (543 words) - 13:07, 17 February 2021
- ...rence topics of interest should include Economics, Management, Information Management, Innovation, Entrepreneurship, Education, Marketing, Human Resources, and F * Country and Industry Studies of Trade9 KB (896 words) - 14:08, 17 February 2021
- | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security ...ual meeting and conference of the newly formed IFIP Working Group on Trust Management (IFIP WG 11.11). IFIPTM 2007 provided a truly global platform for the repor4 KB (565 words) - 12:26, 17 February 2021
- ...national, interdisciplinary, graduate student association dedicated to the critical analysis of terrorism, counterterrorism policy, and related national and in ...nological impacts of security concerns and the conclusions drawn from such critical paradigms, and 4) The ongoing search for security. SATSA and the Moynihan3 KB (359 words) - 13:08, 17 February 2021
- real-time, safety-critical, embedded, or mobile systems * scheduling and resource management2 KB (254 words) - 12:20, 17 February 2021
- In this scenario, it is critical that the underlying business models help to Knowledge management in service ecosystems4 KB (586 words) - 13:07, 17 February 2021
- ...nting and discussing new educational environments, best practices and case studies on innovative technology-based learning strategies, institutional policies 4. Legal and Cultural Management Issues5 KB (661 words) - 13:08, 17 February 2021
- ...First International Workshop on Dependability and Security in Complex and Critical Information Systems ...First International Workshop on Dependability and Security in Complex and Critical Information Systems7 KB (960 words) - 12:21, 17 February 2021
- Early diagnosis is critical, as melanoma can be effectively treated with simple difficult to learn, and several studies have demonstrated limits of dermoscopy3 KB (464 words) - 13:41, 17 February 2021
- * Empirical studies and experiences of agile methods * Agility in systems engineering and safety critical systems4 KB (472 words) - 13:43, 17 February 2021
- multilingual document management/workflow case studies of technology-based solutions4 KB (576 words) - 12:37, 17 February 2021
- ...f a particular community. In many cases, the funding and support for these critical initiatives is fragile and temporary, and directed in piecemeal fashion. Th Information and Data Management4 KB (529 words) - 12:58, 17 February 2021
- ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance6 KB (746 words) - 13:07, 17 February 2021