Buscar
Mostrando ítems 1-10 de 28345
Recommendation Systems, Information Architecture, and Findability
(Pontificia Universidade Catolica Campinas, 2016-09-01)
The present study discusses briefly the concepts of Information Architecture, Information Findability, and Recommendation Systems. It aims to demonstrate how the use of Recommendation Systems in Information Architecture ...
Central America evaluation of projects: Small Farm production systems, agricultural research and information system
(IICA, 1981)
This document is the final report for the evaluations of the small farm Production Systems (SFPS) and Agricultural Research and Information Systems (PIADIC) projects. The Purpose of the evaluation as specified in the ...
A Mobile Framework for Competence Evaluation: Innovation Assessment Using Mobile Information Systems
(Universidad Alberto Hurtado. Facultad de Economía y Negocios, 2014)
Information Systems for Enterprise Architecture
(Universidad UTE, 2014)
Recommendation Systems, Information Architecture, And FindabilityOs Sistemas De Recomendação, Arquitetura Da Informação E A Encontrabilidade Da Informação
(Pontificia Universidade Catolica de Campinas, 2016)
Supply chain security evaluation model and index system based on a 5G information system
(Neural Comput Appl, 2021)
"Currently, the supply chain management model has been widely adopted worldwide. Internationally renowned companies such as IBM and Walmart have made significant achievements in supply chain management and have played a ...
INSTITUTIONAL EVALUATION: ANALYSIS OF SYSTEM EVALUATION AND THE NEED FOR POLITICAL LEGITIMACY
(Univ Estadual Sudoeste Bahia, 2019-01-01)
Large-scale evaluation has come a long way since the 1990s and despite the criticisms and contradictions that the issue involves, the debate about its results, formats and consequences of its implementation in the classroom ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...