Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

Institut für Wirtschafts- und Verwaltungsinformatik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/2872646
  • 0261/2871002646
Publikationen
PDF | RTF
Ergebnisse pro Seite:  10

Niemann, Marco; Riehle, Dennis M.; Brunk, Jens et al.

What is Abusive Language? --- Integrating Different Views on Abusive Language for Machine Learning

Christian Grimme; Mike Preuss; Frank W. Takes; Annie Waldherr (Hrsg). Disinformation in Open Online Media: First Multidisciplinary International Symposium, MISDOOM 2019, Hamburg, Germany, February 27 – March 1, 2019, Revised Selected Papers. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2019 S. 59 - 73


Riehle, Dennis M.; Radas, Jonathan

Which Business Information do Decision-Makers need at Work? - Towards a Classification Framework

Jörg Becker; Dmitriy Novikov; Raisa Uskenbaeva; Dmitry M. Nazarov; Olga A. Tsukanova; Judith Barrios Albornoz; Elena Kornyshova; Oscar Pastor; A V. Shchepkin; V. O. Korepanov; D. Fedyanin; V.N. Burkov (Hrsg). Proceedings of the 21st IEEE Conference on Business Informatics CBI 2019: 15 - 17 July 2019; Moscow, Russia. Los Alamitos, CA: IEEE Computer Society 2019 S. 312 - 139


Schwade, Florian; Schubert, Petra

A Survey on the Status Quo of Social Collaboration Analytics in Practice

Peter M. Bednar; Ulrich Frank; Karlheinz Kautz (Hrsg). Proceeding of the 26th European Conference on Information Systems - "Beyond Digitization - Facets of Socio-Technical Change" ECIS 2018: Portsmouth, UK, June 23-28, 2018. Atlanta, GA: Association for Information Systems/AIS eLibrary 2018 S. Research Papers 136


Schwade, Florian; Schubert, Petra

A Survey on the Status Quo of Social Collaboration Analytics in Practice.

ECIS. 2018 S. 136


Corea, Carl; Delfmann, Patrick

A Tool to Monitor Consistent Decision-Making in Business Process Execution

Wil van der Aalst; Fabio Casati; Raffaele Conforti; Massimiliano de Leoni; Marlon Dumas; Akhil Kumar; Jan Mendling; Surya Nepal; Brian Pentland; Barbara Weber (Hrsg). BPMTracks 2018: Proceedings of the Dissertation Award, Demonstration, and Industrial Track at BPM 2018 - co-located with 16th International Conference on Business Process Management (BPM 2018); Sydney, Australia, September 9-14, 2018. Aachen: CEUR/RWTH 2018 S. 76 - 80


Isagah, Tupokigwe; Wimmer, Maria A.

Addressing Requirements of M-Government Services: Empirical Study from Designers' Perspectives

Atreyi Kankanhalli;Adegboyega Ojo;Delfina Soares (Hrsg). Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance ICEGOV2018: 4 - 6 April 2018; Galway, Ireland. New York, NY: ACM Association for Computing Machinery 2018 S. 599 - 608


Derbyshire, Richard; Green, Benjamin; Prince, Daniel et al.

An Analysis of Cyber Security Attack Taxonomies

Emiliano De Cristofaro; George Danezis; Matthew Smith; Frank Piessens (Hrsg). Proceedings of the3rd IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2018, London, United Kingdom, April 23-27, 2018. Los Alamitos, CA: IEEE Computer Society 2018 S. 153 - 161


Din, Ghulam Mohi Ud; Mauthe, Andreas U.; Marnerides, Angelos K.

Appliance-level Short-Term Load Forecasting using Deep Neural Networks

Pramod K. Varshney;Jian Ren (Hrsg). Proceedings of the International Conference on Computing, Networking and Communications ICNC 2018: Maui, HI, USA, March 5-8, 2018. Los Alamitos, CA: IEEE Computer Society 2018 S. 53 - 57



Troitzsch, Klaus G.

Can Lawlike Rules Emerge without the Intervention of Legislators?

Frontiers in Sociology. Bd. 3. Frontiers Media SA 2018 2