Filter your results
- 10
- 1
- 10
- 1
- 11
- 1
- 11
- 1
- 19
- 17
- 11
- 8
- 7
- 8
- 10
- 7
- 10
- 21
- 13
- 11
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
P2AMF: Predictive, Probabilistic Architecture Modeling Framework5th International Working Conference on Enterprise Interoperability (IWEI), Mar 2013, Enschede, Netherlands. pp.104-117, ⟨10.1007/978-3-642-36796-0_10⟩
Conference papers
hal-01474204v1
|
||
|
Enabling the Crowd Sourcing of Very Large Product Models6th Programming Languages for Manufacturing (PROLAMAT), Oct 2013, Dresden, Germany. pp.254-272, ⟨10.1007/978-3-642-41329-2_26⟩
Conference papers
hal-01485820v1
|
||
|
Existing but Not Explicit - The User Perspective in Scrum Projects in Practice14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.762-779, ⟨10.1007/978-3-642-40477-1_52⟩
Conference papers
hal-01504928v1
|
||
|
Visualizing and Measuring Enterprise Architecture: An Exploratory BioPharma Case6th The Practice of Entrprise Modeling (PoEM), Nov 2013, Riga, Latvia. pp.9-23, ⟨10.1007/978-3-642-41641-5_2⟩
Conference papers
hal-01474793v1
|
||
|
Two Case Studies in Using Chatbots for Security Training8th World Conference on Information Security Education (WISE), Jul 2009, Bento Gonçalves, Brazil. pp.265-272, ⟨10.1007/978-3-642-39377-8_31⟩
Conference papers
hal-01463652v1
|
||
|
Awareness, Transience and Temporality: Design Opportunities from Rah Island14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.696-713, ⟨10.1007/978-3-642-40480-1_48⟩
Conference papers
hal-01501782v1
|
||
|
State-of-the-Art Review on Operational Resilience: Concept, Scope and Gaps19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.273-280, ⟨10.1007/978-3-642-40361-3_35⟩
Conference papers
hal-01470630v1
|
||
|
A SWOT Analysis of Virtual Laboratories for Security Education8th World Conference on Information Security Education (WISE), Jul 2009, Bento Gonçalves, Brazil. pp.233-240, ⟨10.1007/978-3-642-39377-8_27⟩
Conference papers
hal-01463644v1
|
||
|
Distributed Applications and Interoperable SystemsSpringer, LNCS-7891, 2013, Lecture Notes in Computer Science, 978-3-642-38540-7. ⟨10.1007/978-3-642-38541-4⟩
Books
hal-01489472v1
|
||
|
UCD Guerrilla Tactics3rd Human Work Interaction Design (HWID), Dec 2012, Copenhagen, Denmark. pp.112-123, ⟨10.1007/978-3-642-41145-8_10⟩
Conference papers
hal-01463367v1
|
||
|
Business Model Risk Analysis: Predicting the Probability of Business Network Profitability5th International Working Conference on Enterprise Interoperability (IWEI), Mar 2013, Enschede, Netherlands. pp.118-130, ⟨10.1007/978-3-642-36796-0_11⟩
Conference papers
hal-01474205v1
|