Found 1108 results
Filters: First Letter Of Last Name is B [Clear All Filters]
A Novel Outlier Detection Method for Multivariate Data. IEEE Transactions on Knowledge and Data Engineering. :1-1.
.
2020. OASIS: Weakening User Obligations for Security-critical Systems. 2020 IEEE 28th International Requirements Engineering Conference (RE).
.
2020. Operationalizing Agile Methods: Examining Coherence in Large-Scale Agile Transformations. Agile Processes in Software Engineering and Extreme Programming – Workshops.
.
2020. .
2020. Path Kinematics for Combined Discrete and Continuous Event Simulation. 2020 31st Irish Signals and Systems Conference (ISSC).
.
2020. Perceived non-value added activities in the research grant application process through a lean Six Sigma lens: Lean Six Sigma in higher education. Lean Six Sigma in higher education: A practical guide for continuous improvement professionals in higher education..
.
2020. .
2020. Privacy Care: A Tangible Interaction Framework for Privacy Management. ACM Transactions on Internet Technology. :(Inpress).
.
2020. Program Synthesis in a Continuous Space Using Grammars and Variational Autoencoders. Parallel Problem Solving from Nature – PPSN XVI.
.
2020. Reducing medication errors using lean six sigma methodology in a Thai hospital: an action research study . International Journal of Quality & Reliability Management.
.
2020. The Research Grant Application Process through a Lean Six Sigma lens. Lean Sigma Six for Higher Education: A Practical Guide for Continuous Improvement Professionals in Higher Education.
.
2020. A Review of Current Machine Learning Approaches for Anomaly Detection in Network Traffic. Journal of Telecommunications and the Digital Economy. 8:64-95.
.
2020. A Review of Multi-Sensor Fusion System for Large Heavy Vehicles Off Road in Industrial Environments. 2020 31st Irish Signals and Systems Conference (ISSC).
.
2020. Robot Rights? Let's Talk about Human Welfare Instead Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society.
.
2020. Scenario-Based Requirements Elicitation for User-Centric Explainable AI. Machine Learning and Knowledge Extraction.
.
2020. .
2020. Simulating Resource Management across the Cloud-to-Thing Continuum: A Survey and Future Directions. Future Internet. 12:95.
.
2020. .
2020. A Survey on IoT Big Data: Current Status, 13 V’s Challenges, and Future Directions. ACM Comput. Surv.. 53
.
2020. Sustaining Open Source Communities by Understanding the Influence of Discursive Manifestations on Sentiment . Information Systems Frontiers.
.
2020. Taking the Middle Path: Learning About Security Through Online Social Interaction. IEEE Software. 37:25-30.
.
2020. Tight Polynomial Worst-Case Bounds for Loop Programs . Logical Methods in Computer Science. Volume 16, Issue 2
.
2020. Tight Polynomial Worst-Case Bounds for Loop Programs . Logical Methods in Computer Science. 16(2)
.
2020. .
2020. .
2020.