Search results

Jump to: navigation, search
  • |Title=Asian Conference on Cultural Studies |Superevent=Asian Conference on Asian Studies 2011
    2 KB (277 words) - 19:43, 12 November 2020
  • Tool descriptions and case studies with a conceptual message, as well as theoretical papers with clear relevan * Analytical techniques for secure, real-time, hybrid, critical, biological or dependable systems;
    4 KB (543 words) - 16:39, 16 July 2020
  • * User Studies in mLearning ** a critical literature review of the research topic providing the rationale for the rel
    6 KB (798 words) - 15:57, 13 February 2009
  • ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to:
    7 KB (959 words) - 14:51, 27 December 2015
  • ...and mobile phones; they interact with one another virtually; and even find critical interpersonal support and therapy using computers, the web, and other techn * Ethnographic and case studies of children’s use of interactive systems in schools, at home, in hospital
    5 KB (631 words) - 05:50, 14 October 2008
  • ...First International Workshop on Dependability and Security in Complex and Critical Information Systems ...First International Workshop on Dependability and Security in Complex and Critical Information Systems
    7 KB (960 words) - 17:48, 14 October 2008
  • Most of critical activities in the areas of communications (telephone, Internet), energy & f ...s crucial for data protection and recoverability when implementing mission critical applications and services.
    15 KB (2,175 words) - 21:03, 19 March 2013
  • IBM TORONTO SOFTWARE LABORATORY, IBM CENTERS FOR ADVANCED STUDIES IBM Centers for Advanced Studies. This "Meeting of Minds" provides an
    9 KB (1,193 words) - 22:53, 14 October 2008
  • o User studies ...tribution, through e.g., experimental evaluation, theoretical analysis, or critical engagement with HLT. Each submission will be reviewed by at least three pro
    10 KB (1,326 words) - 23:19, 13 December 2017
  • | Title = The Fourth Inter-Varietal Applied Corpus Studies (IVACS) group International Conference on Applying Corpus Linguistics The Fourth Inter-Varietal Applied Corpus Studies (IVACS) group
    3 KB (410 words) - 23:01, 14 October 2008
  • ...ses on the human actor and software agent collaboration in safety and time critical systems-of-systems. This focus includes topics ranging from: In addition, HCP 2008 welcome progress, innovations, demonstrations and case-studies on the following well-known (non-exhaustive) list of HCP-related topics:
    4 KB (518 words) - 14:42, 27 December 2015
  • case studies of technology-based solutions Corpus -based translation studies investigations
    4 KB (576 words) - 23:06, 14 October 2008
  • case studies on practical uses of current translation systems in government and industry ...how MT is used to meet business needs such as just-in-time localization of critical information, provision of technical support information, or creation of pre
    16 KB (2,200 words) - 20:51, 18 February 2021
  • ...pplications in all areas of literary, linguistic, cultural, and historical studies, including interdisciplinary aspects of modern scholarship ...reference to pertinent work in the field (up to 10 items) as part of their critical assessment.
    7 KB (1,033 words) - 23:08, 14 October 2008
  • ...to validate them using statistical/domain knowledge or by real-world case studies.
    2 KB (228 words) - 23:10, 14 October 2008
  • | Acronym = SPECIAL ISSUE ON MISSION CRITICAL NETWOR 2009 | Title = JSAC CALL FOR PAPERS SPECIAL ISSUE ON MISSION CRITICAL NETWORKING
    5 KB (549 words) - 17:15, 5 July 2020
  • ...smart transportation, emergency response, home automation, social studies, critical infrastructure protection, and target tracking, just to mention a few. In p ...ll aspects of wireless sensors, including, but not limited to, theoretical studies, methods, technologies, prototypes, and practical applications.
    4 KB (600 words) - 16:30, 5 July 2020
  • studies related to how people may interact on the Web, how they actually empirical and applied studies related to:
    7 KB (860 words) - 11:55, 7 January 2009
  • ...of people and information. However, whereas in the general web search is a critical application that drives usability, social media has been primarily popular * Studies of users searching in social media
    2 KB (315 words) - 23:22, 14 October 2008
  • |Title=The First International Workshop on the Critical Computer Based Systems ...practical results relevant to the engineering of highly sophisticated and critical systems that are used in automotive, avionics, railway, naval, chemical, nu
    5 KB (660 words) - 16:46, 27 December 2015
  • ..., strategies for promoting, adopting, using Open Source Solutions and case studies or success stories in specific domains. ..., strategies for promoting, adopting, using Open Source Solutions and case studies or success stories in specific domains.
    5 KB (697 words) - 23:18, 14 October 2008
  • ...butions of in-depth description of practitioner experience reports or case studies within the scope of SERENE are invited. Submissions should include sufficie ...t an early stage in their research. The PhD forum session should provide a critical but supportive and constructive environment in which discussions about the
    9 KB (1,264 words) - 18:14, 8 November 2008
  • * Empirical studies in component-based software engineering ...pers describing practical experience with CBSE in mission- and performance-critical systems are of particular interest. Long and short papers on leading-edge r
    8 KB (1,033 words) - 23:18, 14 October 2008
  • successfully used to program real-time and safety critical for critical applications. The key advantage is that this approach has
    6 KB (659 words) - 23:18, 14 October 2008
  • ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to:
    4 KB (463 words) - 13:54, 18 October 2008
  • ...and planned efforts towards this vision: CORDET, DOMENG, SOIS, AOCS system studies, ASSERT, spin-in from IMA and AUTOSAR etc... * AOCS system architecture studies
    18 KB (2,714 words) - 23:23, 14 October 2008
  • * Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability an * Security for large-scale systems and critical infrastructures.
    5 KB (673 words) - 23:19, 14 October 2008
  • We are soliciting industry papers describing innovative applications, case studies and best practices with a goal of fostering collaboration between the resea * Critical infrastructure protection, public safety and emergency management
    4 KB (565 words) - 23:20, 14 October 2008
  • real-time, safety-critical, embedded, or mobile systems * applications, experience reports and case studies in
    2 KB (254 words) - 23:22, 14 October 2008
  • ...tandards and technologies for SHS; Commercial and industrial for SHS; Case studies, prototypes and experience
    13 KB (1,617 words) - 19:03, 24 November 2008
  • guaranteeing service timeliness is becoming a critical feature that elevates * Case studies of using RTSOAA for cloud computing
    7 KB (922 words) - 00:58, 9 January 2009
  • ...resent an opportunity for educators to develop new skills and to stimulate critical debate on theories, approaches, principles and applications of m-learning, ** Case studies in mLearning
    11 KB (1,366 words) - 16:44, 14 January 2009
  • papers on practical studies and experiments, critique of existing work, emerging issues, * Safety critical systems
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...f a particular community. In many cases, the funding and support for these critical initiatives is fragile and temporary, and directed in piecemeal fashion. Th Measurement studies of actual social networks
    4 KB (529 words) - 13:00, 18 January 2009
  • Such alignment is a critical ?early stage? activity to understand * Case studies and empirical reports on the benefits and costs of
    3 KB (465 words) - 13:01, 18 January 2009
  • ...pment projects will come under close scrutiny. It will become increasingly critical to design global partnerships that both clarify cost/benefits and enable de ...nstraints that characterise offshore and outsourced processes; comparative studies of globally distributed, near-sourced and co-located software development.
    6 KB (857 words) - 13:01, 18 January 2009
  • * Intelligent transportation systems, and safety-critical systems * Empirical studies of multidisciplinary approaches
    6 KB (767 words) - 13:01, 18 January 2009
  • Traffic monitoring and analysis (TMA) is critical in understanding telecommunication technology and operation. The lack of in TMA studies in wide range of production environments can be used to uncover deficiencie
    5 KB (431 words) - 13:03, 18 January 2009
  • - components for real-time, safety-critical, secure and/or embedded - industrial or experience reports, and case studies in component
    8 KB (1,079 words) - 17:05, 27 February 2009
  • and critical systems; - Industrial case studies;
    7 KB (1,094 words) - 11:42, 29 September 2016
  • ...cated, remote and mobile participants simultaneously. Similarly, it may be critical to support a spectrum of richness and responsiveness. In order to move forw ...design and real-world user experience. In particular, we are interested in studies that show how to enable easy and effective crossovers between media like vi
    5 KB (670 words) - 17:08, 27 February 2009
  • safety-critical, embedded, or mobile systems * Tools and Case-studies
    4 KB (504 words) - 16:43, 27 December 2015
  • ...nting and discussing new educational environments, best practices and case studies on innovative technology-based learning strategies, institutional policies 5. Domain Applications and Case Studies
    5 KB (661 words) - 15:49, 8 December 2009
  • ...become a key concern both from a social and political point of view. It is critical to provide rescue personnel with information technology tools that enable m ...ed to publish the post-proceedings of all the PRIMA 2009 workshops in the "Studies in Computational Intelligence" book series. All accepted workshop papers wi
    6 KB (783 words) - 17:04, 27 December 2015
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...tandards and technologies for SHS; Commercial and industrial for SHS; Case studies, prototypes and experience
    6 KB (746 words) - 11:35, 2 August 2009
  • In this scenario, it is critical that the underlying business models help to Interdisciplinary studies of service ecosystem
    4 KB (586 words) - 11:35, 2 August 2009
  • ...mate change is likely to be the defining issue of the 21st Century. Recent studies indicate that climate change is accelerating, confirming the most pessimist ...y). In nearly all these challenges, software has a major role to play as a critical enabling technology.
    7 KB (992 words) - 11:44, 2 August 2009
  • - Case studies of management/mining of large-scale software * Experience papers (5 pages) should describe case studies in an
    4 KB (543 words) - 11:35, 2 August 2009
  • ...tter understanding of the problem domains and their characteristics, (2) a critical discussion of recent approaches, models, methods, prototypes, and experienc 4) Case studies and demos
    12 KB (1,624 words) - 11:36, 2 August 2009
  • • Secure and Safety-Critical Implementations • Design and Application Case Studies
    5 KB (605 words) - 15:11, 27 December 2015
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...mization; Internet performance prediction; Internet performance evaluation studies; Internet performance testbeds; Performance evaluation of Web search engine
    14 KB (1,651 words) - 15:56, 15 February 2017
  • -Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability an -Security for large-scale systems and critical infrastructures
    6 KB (766 words) - 10:54, 26 April 2010
  • ...national, interdisciplinary, graduate student association dedicated to the critical analysis of terrorism, counterterrorism policy, and related national and in ...nological impacts of security concerns and the conclusions drawn from such critical paradigms, and 4) The ongoing search for security. SATSA and the Moynihan
    3 KB (359 words) - 00:15, 17 November 2009
  • ...topics are welcome, with a priority given to comparative and longitudinal studies and to papers aimed at analyzing the mechanisms that lead to gender inequal ...ion versus masculinisation of sciences; studies about comparison of female critical mass and necessity of organisational change; women researchers in SET and t
    9 KB (1,397 words) - 16:46, 8 March 2010
  • The conference addresses critical issues related to diversity. Proposals on all relevant topics are welcome, '''Keywords''': diversity, history, cultural studies, culture, globalisation, interdisciplinary, learning, management, globaliza
    932 bytes (103 words) - 11:52, 1 March 2012
  • |Acronym=Global Studies Conference 2012 |Title=5th Global Studies Conference
    800 bytes (90 words) - 16:09, 22 October 2020
  • ...nting and discussing new educational environments, best practices and case studies on innovative technology-based learning strategies, institutional policies 4. DOMAIN APPLICATIONS AND CASE STUDIES
    5 KB (532 words) - 12:25, 16 June 2010
  • *Social and crowd computing: Studies, theories, designs, mechanisms, systems, and/or infrastructures addressing *Theories: Critical analysis or theory with clear relevance to the design or study of social an
    7 KB (935 words) - 13:15, 22 January 2021
  • |Acronym=Global Studies Conference 2011 |Title=4th Global Studies Conference
    837 bytes (98 words) - 16:01, 22 October 2020
  • |Field=Critical Management Studies 1. critical issues of digital culture: practices of online life, for example dealing wi
    5 KB (638 words) - 10:47, 20 September 2010
  • Investigative Case Studies Critical Infrastructure Incident Investigation
    3 KB (462 words) - 11:51, 22 March 2020
  • ...nting and discussing new educational environments, best practices and case studies on innovative technology-based learning strategies, institutional policies 4. DOMAIN APPLICATIONS AND CASE STUDIES
    4 KB (517 words) - 12:03, 1 July 2011
  • E-business architectures leverage Web Technologies to implement mission-critical e-business systems. E-Business Case Studies:
    10 KB (1,232 words) - 18:10, 5 March 2012
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...nd channel characterization; Signal separation and Interference rejection; Critical infrastructure protection
    13 KB (1,580 words) - 19:35, 18 February 2021
  • ...i’20) is a unique interdisciplinary conference facilitating creative and critical dialogue with the aim of understanding the Web and its impacts and reflecti ...ull range of across the disciplines (e.g., Web data, surveys, longitudinal studies, interviews, ethnographic and visual data) to better understand user and pr
    6 KB (910 words) - 12:04, 31 January 2020
  • * Ethics, Economics, and Politics (e.g., studies on broader implications, norms and ethics, economic value, political impact ...on a body of research, the field, theories, models, and methods, providing critical, provocative, creative ideas and insights, with actionable lessons for the
    8 KB (1,024 words) - 09:57, 13 May 2020
  • Critical and Cultural Studies, Gender and Communication
    5 KB (767 words) - 08:06, 11 May 2012
  • ...ENT, SOCIAL CONTEXT AND LEARNING ENVIRONMENTS,DOMAIN APPLICATIONS AND CASE STUDIES,UBIQUITOUS LEARNING ...nting and discussing new educational environments, best practices and case studies on innovative technology-based learning strategies, institutional policies
    5 KB (671 words) - 18:54, 20 June 2012
  • ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to the following topics list:
    3 KB (332 words) - 19:36, 20 August 2012
  • * Lessons learned from case studies * Best practices and lessons learned from case studies
    8 KB (1,067 words) - 12:26, 7 July 2018
  • *Social and crowd computing. Studies, theories, designs, mechanisms, systems, and/or infrastructures addressing *Theories. Critical analysis or theory with clear relevance to the design or study of social an
    7 KB (962 words) - 13:10, 7 December 2020
  • *Social and crowd computing: Studies, theories, designs, mechanisms, systems, and/or infrastructures addressing *Theories: Critical analysis or theory with clear relevance to the design or study of social an
    6 KB (867 words) - 13:19, 18 December 2020
  • |Title=EFCS 2016 : CfP: The Fifth Euroacademia Forum of Critical Studies: Asking Big Questions Again, 11 – 12 November 2016, Lucca, Italy |Field=conference, critical studies, interdisciplinary, social sciences
    519 bytes (59 words) - 10:47, 11 September 2016
  • |Field=critical animal studies, resilience studies, human-animal relations, ecology and veterinary
    446 bytes (47 words) - 15:26, 25 September 2016
  • Mental workload and user studies Mental workload in safety critical domains
    4 KB (470 words) - 11:54, 4 October 2016
  • very critical and important for every organization. This poses several encouraged. Case studies (successful or not) are also encouraged.
    7 KB (887 words) - 15:22, 15 July 2017
  • ...isual story. Moreover, detecting the reliability of such visual content is critical to ensure the truth of the story. Specific topics: User studies: we also encourage ideas about how to evaluate visual user experiences in t
    3 KB (376 words) - 11:59, 8 August 2017
  • - Safety-Critical Software or case studies. Please note that the papers will be accepted or rejected in the
    8 KB (1,150 words) - 10:11, 7 August 2019
  • technologies, smart cities, e-health, e-commerce, social and behavioral studies, Privacy issues in social and behavioral studies
    4 KB (532 words) - 13:24, 28 July 2017
  • ...eview Special Issue on European Union and Challenges of Cultural Policies: Critical Perspectives Special issue on ‘European Union and Challenges of Cultural Policies: Critical
    7 KB (1,044 words) - 18:35, 10 February 2021
  • Early diagnosis is critical, as melanoma can be effectively treated with simple difficult to learn, and several studies have demonstrated limits of dermoscopy
    3 KB (464 words) - 09:59, 21 August 2017
  • * Empirical studies and experiences of agile methods * Agility in systems engineering and safety critical systems
    4 KB (472 words) - 10:36, 26 November 2017
  • * Foundations and conceptual studies of and for agile methods * Empirical studies and experiences
    2 KB (230 words) - 10:36, 26 November 2017
  • Mental workload and user studies Mental workload in safety critical domains
    4 KB (521 words) - 12:49, 14 January 2018
  • ...al investigations of collaborative practices. Findings, guidelines, and/or studies related to communication, collaboration, and social technologies, practices * Critical analysis or theory with clear relevance to study or design of collaborative
    2 KB (269 words) - 11:59, 17 April 2020
  • * Mental workload and user studies Mental workload in safety critical domains
    3 KB (406 words) - 23:19, 9 June 2020
  • ...al investigations of collaborative practices. Findings, guidelines, and/or studies related to communication, collaboration, and social technologies, practices * Theories. Critical analysis or theory with clear relevance to study or design of collaborative
    2 KB (299 words) - 12:07, 17 April 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...works; CLOUD/GRID fora, standards, development, evolution; CLOUD/GRID case studies, validation testbeds, prototypes, and lessons learned
    14 KB (1,770 words) - 14:56, 19 April 2020
  • ...opment, assessment, operation and maintenance of safety-related and safety-critical computer systems. Topics include, but are not limited to: * Industrial experience and case studies.
    4 KB (475 words) - 10:23, 19 June 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...ques; Medical IoT Device-to-Device communication; Blockchain in supporting critical infrastructures; Vulnerability on social media spaces; Internet of Medical
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...s, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure * Empirical and experimental studies with game, control, or optimization theory-based analysis for security and
    3 KB (353 words) - 12:35, 23 June 2020
  • ...s, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure * Empirical and experimental studies with game, control, or optimization theory-based analysis for security and
    3 KB (423 words) - 11:27, 23 June 2020
  • * New approaches for security and privacy in cloud computing and for critical infrastructure * Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy
    3 KB (407 words) - 11:20, 23 June 2020
  • ...ms; Software processes and practice for emotionally-oriented systems; Case studies relating information systems and emotions; Ethics in emotion-driven systems ...t production; Social poor-quality arguments; Social fuzzy thinking; Online critical literacy; Linked argumented data; Complex annotation tools and interfaces;
    9 KB (1,068 words) - 19:47, 9 July 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...User-centric requirements in network-centric approaches; User-centric and critical time-centric applications and services; User information access behavior; U
    10 KB (1,232 words) - 16:20, 22 March 2021
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...ehicles; Biomedical-related software; Biometrics related software; Mission critical software; Real-time software; E-health related software; Military software;
    13 KB (1,573 words) - 12:00, 10 July 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...us systems; Simulation urban-situations n smart cities; Validating mission-critical applications; Exascale simulations high performance systems; Simulation of
    12 KB (1,421 words) - 12:02, 10 July 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u Operational risk (opRisk); OpRisk and field studies; Reputation risk; Risk and security-awareness; Business continuity and disa
    15 KB (1,886 words) - 16:16, 25 August 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...communication; Access control in underwater networks; Latency effects for critical applications and synchronization; Synchronization and delays in underwater
    15 KB (1,880 words) - 14:45, 27 August 2020
  • * Country and Industry Studies of Trade * Critical Management Studies
    9 KB (896 words) - 16:31, 6 August 2020

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)