نتایج جستجو برای: کسبوکارهای نوپای حوزۀ it

تعداد نتایج: 2842778  

2005
Atsushi Fujii Tetsuya Ishikawa

This paper describes our system participated in the Document and Passage Retrieval Subtasks at the NTCIR-5 Patent Retrieval Task. The purpose of these subtasks was the invalidity search, in which a patent application including a target claim is used to search documents that can invalidate the demand in the claim. Our system is characterized by the structure analysis for both target claim and en...

2013
Shai Izraeli Ajay Vora C. Michel Zwaan James Whitlock

Department of Pediatric Hemato-Oncology, Edmond and Lily Safra Children’s Hospital, Sheba Medical Centre, Tel-Hashomer, Ramat Gan, and Tel Aviv University Medical School, Tel Aviv, Israel; Department of Haematology, Sheffield Children’s Hospital, Sheffield, United Kingdom; Pediatric Oncology/ Hematology, Erasmus MC–Sophia Children’s Hospital, Rotterdam, The Netherlands; and Division of Haematol...

2008
Jesus Rios David Rios Insua David Banks

Applications in counterterrorism and corporate competition have led to the development of new methods for the analysis of decision-making when there are intelligent opponents and uncertain outcomes. This field is sometimes called adversarial risk analysis. In this paper, we illustrate a general framework developed for supporting a decision maker in a problem with intelligent opponents through a...

2003
Markus Erhard Holger Böken Frank Glante

For the precaution against physical soil degradation in managed soils, accurate planning data about anthropogenic impacts and for policy making applicable indicators to describe the driving force and state are required. To assess the potential erosion risk, accurate information is available, but to assess the actual erosion risk it is necessary to regard current land-use and cultivation data fo...

Journal: :JIPS 2005
Jung-Ho Eom Seon-Ho Park Tae-Kyung Kim Tai-Myung Chung

In this paper, we dealt with substantial asset analysis methodology applied to twodimensional asset classification and qualitative evaluation method according to the business process. Most of the existent risk analysis methodology and tools presented classification by asset type and physical evaluation by a quantitative method. We focused our research on qualitative evaluation with 2-dimensiona...

2017
Melanie Steinhüser Lena Waizenegger Shahper Vodanovich Alexander Richter

The voluntary use of private device by employees without formal approval of the IT department, commonly termed Shadow IT, is an increasingly widespread phenomenon. In this paper, we study the role of private smartphones (and related applications like WhatsApp) in knowledge-intensive practices in the manufacturing domain. With an in-depth case study based on data gained from observations and int...

2005
Sue Allen

This study investigated the effect of different scientific inquiry activities on visitors' understanding of the science underlying an interactive exhibit. The exhibit, "colored shadows," creates a pattern of colored shadows on a white wall, due to a person's body blocking the light from colored lamps. The subjects were 392 museum visitors, aged 7 to adult. They were individually guided through ...

2015
Laurie Phillips Honda

In response to multiple LGBTQ youth suicides in 2010, Dan Savage and Terry Miller sought to provide messages of hope to at-risk LGBTQ youth through the YouTube-based “It Gets Better Project” (IGBP). With empirical data gathered through online chatbased in-depth interviews, this study offers insight into multi-dimensional motivations for participation in an online community. Pointedly, data show...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید