Search

Your search keyword '"computer and systems science"' showing total 37 results

Search Constraints

Start Over You searched for: Descriptor "computer and systems science" Remove constraint Descriptor: "computer and systems science"
37 results on '"computer and systems science"'

Search Results

1. On the hardness of the hidden subspaces problem with and without noise. Cryptanalysis of Aaronson-Christiano’s quantum money scheme

2. User Expressions Translated into Requirements

3. Conceptual Model of Online Pedagogical Information Security Laboratory: Toward an Ensemble Artifact

4. Design of Smart City Systems from a Privacy Perspective

5. Knowledge security risk management in contemporary companies – toward a proactive approach

6. Generic Data Models for Semantic e-Government Interoperability : Literature Review

7. Integrating Usability Practices into Agile Development: A Case Study

8. Genre-based assessment of information and knowledge security risks

9. Steering Institutionalization through Institutional Work: The Case of an eProcurement System in Indonesian Local Government

10. Nyttorealisering av FGS:er : Delprojekt 2

11. Rethinking the Information Security Risk Practices: A Critical Social Theory Perspective

12. Table-top exercises for emergency management : tame solutions for wicked problems

13. Challenges in information systems procurement in the public sector

14. Forming theories of practices for software engineering

15. Challenges with social media for user involvement

16. Measuring trust in online social networks : the effects of network parameters on the level of trust in trust games with incomplete information

17. Mobile applications development on Apple and Google platforms

18. Exploring users motivation in innovation communities

19. An LLVM Compiler for CAL

20. Development and Deployment of Delay Tolerant Networks: An Arctic Village Case

21. Preserving visual appearance of e-government web forms using metadata driven imitation

22. Openness in Living Labs – Facilitating Innovation

23. A model for explaining strategic IT- and information security to senior management

24. Digitalt bevarande - en tillväxtmotor i vardande

25. Internet technology and networks

26. What do the words 'Internet Security' mean?

27. På väg mot en 24-timmarskommun- En fallstudie av Mjölby kommun

28. Implementeringen av ERP-systemet SAP R/3 : En komparativ fallstudie av Posten AB och Mölnlycke Health Care

29. A Design Rationale for Pervasive Computing - User Experience, Contextual Change, and Technical Requirements

30. En ansats för att få handlingsbarhet i affärssystem

31. ARGOS – A conceptual security model for service oriented business environments

32. Work Stress and Information Systems : Characterization of a Workplace from a Sustainability Perspective

33. An approach to Achieve Actability in Enterprise Systems

34. A Measure of Fun : Extending the scope of web usability

35. Massification of the Intangible : An investigation into embodied meaning and information visualization

36. ARGOS – En konceptuell säkerhetsmodell för en serviceorienterad affärsmiljö

37. New Directions in Symbolic Model Checking

Catalog

Books, media, physical & digital resources