Found 3470 results
Topology-Aware Access Control of Smart Spaces. Computer. 50
.
2017. Towards a Gamified Equivalent Mutants Detection Platform. 10th IEEE International Conference on Software Testing, Verification and Validation (ICST)10th IEEE International Conference on Software Testing, Verification and Validation (ICST).
.
2017. Towards a protocol for inferring preferences using majority-rule sorting models. ADT 2017, The 5th International Conference on Algorithmic Decision TheoryADT 2017, The 5th International Conference on Algorithmic Decision Theory.
.
2017. Towards an emulated IoT test environment for anomaly detection using NEMU. 2017 Global Internet of Things Summit (GIoTS).
.
2017. Transition from Plan Driven to SAFe : Periodic Team Self-Assessment. CoRR. abs/1711.00959
.
2017. Transitioning from traditional to Problem-Based Learning in Management Education: the case of a frontline manager skills development programme. Journal of Innovations in Education and Teaching International. 34
.
2017. A Tutorial for Olfaction-Based Multisensorial Media Application Design and Evaluation. ACM Comput. Surv.. 50:67:1–67:30.
.
2017. .
2017. .
2017. Uncovering Key Factors for a Hospital IT Change Strategy. Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 5: HEALTHINF, (BIOSTEC 2017)Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies - Volu.
.
2017. A Unified Approach to Automate the Usage of Plagiarism Detection Tools in Programming Courses. 12th IEEE International Conference on Computer Science & Education (ICCSE 2017)12th IEEE International Conference on Computer Science & Education (ICCSE 2017).
.
2017. Uplink Adaptive Multimedia Delivery (UAMD) scheme for Video Sensor Network. 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
.
2017. Uplink Adaptive Multimedia Delivery (UAMD) scheme for Video Sensor Network. 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
.
2017. .
2017. Use of Organisational Topologies for Forensic Investigations. Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics.
.
2017. Using analysis of temporal variances within a honeypot dataset to better predict attack type probability. 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST).
.
2017. Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews. 2017 IEEE 25th International Requirements Engineering Conference (RE).
.
2017. UTCP: Compositional Semantics for Shared-Variable Concurrency. 20th Brazilian Symposium on Formal Methods .
.
2017. .
2017. UTPCalc - A calculator for UTP Predicates. The 6th International Symposium on Unifying Theories of ProgrammingThe 6th International Symposium on Unifying Theories of Programming.
.
2017. Video Streaming in Content-Centric Mobile Networks: Challenges and Solutions. IEEE Wireless Communications. 24:157-165.
.
2017. Where do I begin? Getting the Basics Right in Smart Citizen Engagement Projects The Right to the Smart City: Citizenship, Civic Participation, Urban Commons and Co-Creation.
.
2017. Word Re-Embedding via Manifold Dimensionality Retention. Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing.
.
2017. A ZigBee honeypot to assess IoT cyberattack behaviour. 2017 28th Irish Signals and Systems Conference (ISSC). :1-6.
.
2017. .
2016.