„Management--Data processing“
Suchergebnisse
10.000+ Treffer
-
Transforming Data in-to Decisions with AI – Navigating the Landscape of Modern Data Analysis
-
Being Informed or Getting the Product? – How the Coexistence of Scarcity Cues and Online Consumer Reviews Affects Online Purchase Decisions
-
Making Life Easier: Exploring the Influence of Chatbot’s Prompt Competency on Citizens’ Continuance in Government Chatbot Context
-
Von der Fachkraft zum Key-User – Ein Leitfaden zur erfolgreichen Entwicklung von Mitarbeitern in einem ERP-Projekt
-
Modellieren und Programmieren unter Verwendung der Satzstruktur natürlicher Sprachen – Eine Anleitung
-
Von der Fachkraft zum Key-User – ein Leitfaden zur erfolgreichen Entwicklung von Mitarbeitern in einem ERP-Projekt
-
Modellieren und Programmieren unter Verwendung der Satzstruktur natürlicher Sprachen – eine Anleitung
-
Computer and Communication Engineering – 5th International Conference, CCCE 2025, Helsinki, Finland, May 23–25, 2025, Revised Selected Papers
-
A nomogram for predicting ICU mortality of sepsis associated encephalopathy: a retrospective cohort study based on MIMIC-IV and eICU-CRD
-
Axial compressive behavior of reinforced concrete-filled circular steel tubular columns: finite element and machine learning modelling
-
Uncovering Financial Distress with Textual Risk Disclosures in Annual Reports: Insights from Large Language Models
-
The Impact of AI News on Default Risk of Chinese Listed Companies: Forecasting Based on Deep Learning
-
The Dynamics of Stock Market Responses Following the Cyber-Attacks News: Evidence from Event Study
-
A Non-Interactive and Secure Dynamic Multi-Party FHE Scheme
-
Perspectives in Business Informatics Research – 10th International Conference, BIR 2011, Riga, Latvia, October 6-8, 2011. Proceedings
-
Global Outsourcing Discourse – Exploring Modes of IT Governance
-
Flow Hijacking in eBPF: Exploitation and Mitigation Across both Interpreter and JIT Execution
-
A Framework for Drift Detection and Adaptation in AI-driven Anomaly and Threat Detection Systems
-
An Efficient Scheme for Preventing Cache Poisoning Attack Against DNS Forwarders Based on Redactable Signature
-
Enhancing ROS 2 (robot operating system 2) security with standardized post-quantum cryptosystems