Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 9 of 9)
Clustering and Recommendation Techniques for Access Control Policy Management
Coordinating decentralized learning and conflict resolution across agent boundaries
Essays on Exploitation and Exploration in Software Development
Interactive Programming Support for Secure Software Development
MANAGERIAL RISK IN INFORMATION TECHNOLOGY INVESTMENTS: EFFECTS OF FRAMING, NARROW FRAMING AND TIME INCONSISTENT PREFERENCES ON REAL OPTIONS EXERCISE DECISIONS
THE DIFFUSION AND IMPACT OF RADIO FREQUENCY IDENTIFICATION IN SUPPLY CHAINS: A MULTI-METHOD APPROACH
The Visual Uncertainty Paradigm For Controlling Screen-Space Information In Visualization
UNDERSTANDING AND DESIGNING FOR INTERACTIONAL PRIVACY NEEDS WITHIN SOCIAL NETWORKING SITES
USER PARTICIPATION INTENTION AND SOCIAL INFLUENCE IN VIRTUAL COMMUNITIES