top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Linked Data : Storing, Querying, and Reasoning / by Sherif Sakr, Marcin Wylot, Raghava Mutharaju, Danh Le Phuoc, Irini Fundulaki
Linked Data : Storing, Querying, and Reasoning / by Sherif Sakr, Marcin Wylot, Raghava Mutharaju, Danh Le Phuoc, Irini Fundulaki
Creatore [Sakr, Sherif, author]
Estensione 1 online resource (XX, 223 pages 70 illustrations, 7 illustrations in color.) : online resource
Disciplina 025.42/7
Accesso persona Wylot, Marcin, author
Mutharaju, Raghava, author
Le Phuoc, Danh, author
Fundulaki, Irini, author
Genere/Forma Electronic books
ISBN 9783319735153
3319735152
9783319735146
3319735144
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Introduction -- 2 Fundamentals -- 3 Centralized RDF Query Processing -- 4 Distributed RDF Query Processing.- 5 Processing of RDF Stream Data -- 6 Distributed Reasoning of RDF Data -- 7 Benchmarking RDF Query Engines and Instance Matching Systems -- 8 Provenance Management for Linked Data -- 9 Conclusions and Outlook.
Record Nr. NYU-006274735
[Sakr, Sherif, author]  
Materiale a stampa
Lo trovi qui: New York University
Building Custom Tasks for SQL Server Integration Services
Building Custom Tasks for SQL Server Integration Services
Creatore [Leonard, Andy]
Estensione 1 online resource (117 pages)
Disciplina 004
Genere/Forma Electronic books
ISBN 9781484229408
1484229401
1484229398
9781484229392
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Story of This Book; Tribal Knowledge; A Starting Point; What Problem Are We Trying to Solve?; Chapter 2: Creating the Assembly; Opening Visual Studio IDE; Adding a Reference; Chapter 3: Signing the Assembly; Preparing to Add a Key; Creating the Key; Applying the Key; Chapter 4: Preparing the Environment; Adding the Solution to Source Control; Preparing to Build; Setting the Output Path; Chapter 5: Coding the Task; Using a Reference; Decorating the Class.
Inheriting from TaskAdding a Property; Investigating Task Methods; Overriding the Validate Method; Overriding the Execute Method; Chapter 6: Coding the Task Editor; Adding a Task Editor; Adding References; Some Implementation; Adding a Form; Coding the Click Event and the Form; Chapter 7: Signing and Binding; Signing the Task Editor Project; Reviewing the Public Key Token Value; Binding the Task Editor to the Task; Coding the Task Functionality; Add an Icon; Building the Task; Testing the Task; Chapter 8: Tips on Troubleshooting; Unregistering the Task; Troubleshoot the Issue.
Chapter 9: Notes from ExperienceStart Visual Studio as an Administrator; Learn How to Recover; Building a Notes File; Cleaning the Solution; Change the Icon File's Build Action Property; Chapter 10: Demonstration Code; Index.
Record Nr. NYU-006088784
[Leonard, Andy]  
Materiale a stampa
Lo trovi qui: New York University
Learn RPGs in GameMaker : Build and Design Role Playing Games
Learn RPGs in GameMaker : Build and Design Role Playing Games
Creatore [Tyers, Ben.]
Estensione 1 online resource (310 pages)
Disciplina 004
Genere/Forma Electronic books
ISBN 9781484229460
1484229460
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Chapter 1: Introduction; Programming/Source Code Notes; Story -- Plot; Story -- Character Design; Story -- Enemy Design and Minions; Story -- Objectives; Story -- Setting; Aesthetics -- Art Style; Aesthetics -- Choice of Art Style; Aesthetics -- Scening; Aesthetics -- Sound Design; Aesthetics -- Projection; Core Game-Play -- Battle; Core Game-Play -- Ending; Core Game-Play -- Exploration; Core Game-Play -- In-Game Text; Core Game-Play -- Scoring; Extended Game-Play -- Collectables.
Extended Game-Play -- Further ConsiderationsExtended Game-Play -- Mini-Games; Extended Game-Play -- Quirks; Extended Game-Play -- Saving; Game Base; Chapter 2: The Alert Text Effect; Chapter 3: Battle System; Chapter 4: Boss Character's Battle; Chapter 5: Branching Dialogue; Chapter 6: Coin System Shop; Chapter 7: Cutscene; Fade In/Out; Common Elements; Base Code; Scene 1; Scene 2; Scene 3; Scene 4; Scene 5; Scene 6; Scene 7; Scene 8; Scene 9; Scene 10; Scene 11; Chapter 8: Depth-Based Graphics; Chapter 9: Downloading Bonus Levels from a Website; Chapter 10: Drivable Vehicles.
Chapter 11: Enemy Path FindingChapter 12: Footstep Sounds; Chapter 13: Hints and Tips; Chapter 14: HUD; Chapter 15: Inventory; Chapter 16: Invincibility; Chapter 17: Mini-Quests; Chapter 18: Multiple Locations; Chapter 19: Positional Audio; Chapter 20: Respawn Points; Chapter 21: Useable Items; Chapter 22: Weapon Control; Chapter 23: Zooming; Chapter 24: Destructible Terrain; Chapter 25: Dashing; Chapter 26: Quest Completion; Chapter 27: Road Builder; Chapter 28: Character Progression Upgrade; Chapter 29: Party Mechanics; Chapter 30: Day/Night Cycle; Chapter 31: Puzzle Room.
Chapter 32: Treasure HuntingChapter 33: Card Battle; Chapter 34: Graphical Effects; Chapter 35: Random Level Generation; Chapter 36: Fishing Mini-Game; Chapter 37: Ship Mini Game; Chapter 38: Dice Rolling; Chapter 39: Mini-Game and Dual View; Chapter 40: Game End; Chapter 41: Saving; Index.
Record Nr. NYU-006090089
[Tyers, Ben.]  
Materiale a stampa
Lo trovi qui: New York University
The Support of Decision Processes with Business Intelligence and Analytics : Insights on the Roles of Ambidexterity, Information Processing and Advice
The Support of Decision Processes with Business Intelligence and Analytics : Insights on the Roles of Ambidexterity, Information Processing and Advice
Creatore [Kowalczyk, Martin]
Estensione 1 online resource (156 pages)
Disciplina 004
Genere/Forma Electronic books
ISBN 9783658192303
3658192305
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword; Acknowledgements; Contents; List of Figures; List of Tables; List of Acronyms; 1 Introduction; 1.1 Scientific Relevance and Problem Characterization; 1.2 Research Context and Fundamentals; 1.2.1 Business Intelligence and Analytics; 1.2.2 Decision Processes and Organizational Information Processing; 1.2.3 Decision Making and Individual Information Processing; 1.3 Research Goals and Questions; 1.4 Thesis Structure and Outline; 2 Study A: A Structured Literature Review on Business Intelligence and Analytics from a Decision Process Perspective; 2.1 Introduction.
2.2 Decision Support and Decision Processes2.2.1 DSS Background and Technological Conceptualization; 2.2.2 Decision Process Background and Research Framework; 2.3 Review Method; 2.3.1 Review Scope; 2.3.2 Search Terms; 2.3.3 Inclusion and Exclusion Criteria; 2.3.4 Data Sources and Search Process; 2.3.5 Data Extraction and Analysis Procedures; 2.4 Results of the Structured Literature Review; 2.4.1 Studies on the General Support of Decision Processes; 2.4.2 Studies on the Specific Effects on Decision Processes; 2.5 Discussion of Results; 2.6 Research Opportunities; 2.7 Conclusion.
3 Study B: Big Data and Information Processing in Organizational Decision Processes3.1 Introduction; 3.2 Theoretical Background; 3.2.1 Big Data and BI 3.2.2 Information Processing Theory and Decision Processes; 3.2.3 Data-centric and Organizational Information Processing Mechanisms; 3.3 Research Approach; 3.3.1 Research Design; 3.3.2 Data Collection; 3.3.3 Overview of Cases; 3.3.4 Data Analysis; 3.4 Empirical Results; 3.4.1 Big Data in Different Decision Contexts; 3.4.2 Data-centric and Organizational Information Processing Mechanisms.
3.4.3 Information Processing Mechanisms in Different Decision Contexts3.4.4 Dynamics of Information Processing Mechanism Composition; 3.5 Discussion of Results and Conclusion; 3.5.1 Theoretical Implications; 3.5.2 Practical Implications; 3.5.3 Limitations and Directions for Future Research; 4 Study C: Perspectives on Collaboration Procedures and Politics during the Support of Decision Processes with Business Intelligence and Analytics; 4.1 Introduction; 4.2 Theoretical Background; 4.2.1 Business Intelligence and Analytics (BI & A) and Information Quality.
4.2.2 Political Behavior and Procedural Rationality in Decision Processes4.2.3 Collaboration Procedures and Ambidexterity in Decision Processes; 4.3 Research Method; 4.3.1 Research Design; 4.3.2 Data Collection; 4.3.3 Case Overview; 4.3.4 Data Analysis; 4.4 Results; 4.4.1 Impact of Political Behavior and Procedural Rationality; 4.4.2 Decision Process Rigor and Agility as Dimensions of Ambidexterity; 4.4.3 Complementarity of Information Quality and Ambidexterity; 4.5 Discussion and Conclusion; 4.5.1 Discussion of Key Findings; 4.5.2 Limitations and Future Research.
Record Nr. NYU-006090477
[Kowalczyk, Martin]  
Materiale a stampa
Lo trovi qui: New York University
Support vector machines and perceptrons : learning, optimization, classification, and application to social networks / M.N. Murty, Rashmi Raghava
Support vector machines and perceptrons : learning, optimization, classification, and application to social networks / M.N. Murty, Rashmi Raghava
Creatore [Murty, M. N. author]
Estensione 1 online resource (xiii, 95 pages) : illustrations.
Disciplina 006.3/1
004
Accesso persona Raghava, Rashmi, author
Genere/Forma Electronic books
ISBN 9783319410630
3319410636
9783319410623
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Linear Discriminant Function -- Perceptron -- Linear Support Vector Machines -- Kernel Based SVM -- Application to Social Networks -- Conclusion.
Record Nr. NYU-006185657
[Murty, M. N. author]  
Materiale a stampa
Lo trovi qui: New York University
Lumen programmers guide : writing PHP microservices, REST and web service APIs / Paul Redmond
Lumen programmers guide : writing PHP microservices, REST and web service APIs / Paul Redmond
Creatore [Redmond, Paul]
Estensione 1 online resource
Disciplina 005.1
004
Genere/Forma Electronic books
ISBN 9781484221877
1484221877
1484221869
9781484221860
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Installing Lumen; Homestead; Mac OSX; Linux; Red Hat/CentOS; Debian/Ubuntu; Windows; Conclusion; Chapter 2: Hello Lumen; Setting Up a New Project; Routes; The Hello World Route; Route Parameters; Middleware and Responses; Global Middleware; Route Middleware; The Request and Response Objects; The Request; The Response; Onward; Chapter 3: Creating the Book Application; Building Something Amazing; Environment Setup; Checking Unit Tests; Setup Complete.
Chapter 4: Starting the Books APICreating the First Endpoint; Setting Up Models and Seed Data; Eloquent Books; Success; Chapter 5: Creating, Reading, Updating, and Deleting Books; Requesting an Individual Book; Creating a New Book; Updating an Existing Book; Deleting Books; Conclusion; Chapter 6: Responding to Errors; Test Database; Model Factories; Factories in Tests; Better Error Responses; Framework Exception Handling; JSON Exceptions; Testing the Exception Handler; Conclusion; Chapter 7: Leveling Up Responses; Introducing Fractal; First Version of API Response Formatting.
The Fractal Response ClassThe Book Transformer; The Fractal Response Class; Fractal Response Service; Integrating the Fractal Response Service; Conclusion; Chapter 8: Validation; First Attempt at Validation; More Validation Constraints; Custom Validation Messages; Other Approaches; Conclusion; Chapter 9: Authors; The Authors Database Schema; Fixing Broken Tests; Conclusion; Chapter 10: The /authors API Resource; The GET /authors Endpoint; The AuthorsTransformer; The Author Controller; The GET /authors/{id} Endpoint; A Basic Response; Including Other Models in the Response.
The POST /authors EndpointThe PUT /authors/{id} Endpoint; The DELETE /authors/{id} Endpoint; Conclusion; Chapter 11: Book Bundles; Defining the Relationship Between Books and Bundles; The GET /bundles/{id} Endpoint; Adding a Book to a Bundle; Remove a Book from a Bundle; Conclusion; Chapter 12: Ratings; Database Design; Rating an Author; Adding an Author Rating; Deleting an Author Rating; Ratings in the Author API; Eager Loading Ratings; Conclusion; Appendix: Where to Go From Here; Laravel; Laracasts; Mockery; Guzzle; Index.
Record Nr. NYU-006186091
[Redmond, Paul]  
Materiale a stampa
Lo trovi qui: New York University
Web Work
Web Work
Creatore [Choo, Chun Wei.]
Estensione 1 online resource (226 pages).
Disciplina 025.0425
Accesso persona Detlor, Brian
Owen, J. Mackenzie
Genere/Forma Electronic books
ISBN 9789401594059
9401594058
9789048155200
9048155207
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front ; Table of Contents; Preface; Chapter 1: Information Seeking; Chapter 2: The Structure and Dynamics of Organizational Knowledge; Chapter 3: The Intranet as Infrastructure for Knowledge Work; Chapter 4: Designing Intranets to Support Knowledge Work; Chapter 5: Models of Information Seeking on the World Wide Web; Chapter 6: Understanding Organizational Web Use; Coda; References; Index.
Record Nr. NYU-006186521
[Choo, Chun Wei.]  
Materiale a stampa
Lo trovi qui: New York University
Securing SQL Server : DBAs Defending the Database
Securing SQL Server : DBAs Defending the Database
Creatore [Peter A. Carter]
Edizione [1st ed.]
Estensione 1 online resource (173)
Disciplina 004
Genere/Forma Electronic books
ISBN 1484222652
9781484222652
1484222644
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Threat Analysis; Understanding Threat Modelling; Identifying Assets; Creating an Architecture Overview; Creating the Infrastructure Components; Identifying the Technology Stack; Creating a Security Profile; Identifying Threats; Understanding STRIDE; Using STRIDE; Rating Threats; Understanding Threat Rating Methodologies; Understanding DREAD Methodology; Using DREAD Methodology; Creating Countermeasures; Summary; Chapter 2: SQL Server Security Model.
Security Principal HierarchyInstance Level Security; Logins; Creating a Login; Migrating Logins Between Instances; Server Roles; Credentials; Database-Level Security; Users; Users with a Login; Users Without a Login; Database Roles; Summary; Chapter 3: SQL Server Audit; Understanding SQL Server Audit; SQL Server Audit Actions and Action Groups; Implementing SQL Server Audit; Creating a Server Audit; Create a Server Audit Specification; Create a Database Audit Specification; Creating Custom Audit Events; Creating the Server Audit and Database Audit Specification; Raising the Event; Summary.
Chapter 4: Data-Level SecuritySchemas; Ownership Chaining; Impersonation; Row-Level Security; Security Predicates; Security Policies; Implementing RLS; Dynamic Data Masking; Summary; Chapter 5: Encryption in SQL Server; Generic Encryption Concepts; Defense-in-Depth; Symmetric Keys; Asymmetric Keys; Certificates; Self-Signed Certificates; Windows Data Protection API; SQL Server Encryption Concepts; Master Keys; EKM and Key Stores; SQL Server Encryption Hierarchy; Encrypting Data; Encrypting Data with a Password or a Passphrase; Encrypting Data with Keys and Certificates.
Transparent Data EncryptionConsiderations for TDE with Other Technologies; Implementing TDE; Administering TDE; Backing up the Certificate; Migrating an Encrypted Database; Always Encrypted; Implementing Always Encrypted; Always Encrypted Limitations; Summary; Chapter 6: Security Metadata; Security Principal Metadata; Finding a User's Effective Permissions; Securable Metadata; Code Signing; Permissions Against a Specific Table; Audit Metadata; Encryption Metadata; Always Encrypted Metadata; TDE Metadata; Securing Metadata; Risks of Metadata Visibility; Summary.
Chapter 7: Implementing Service Accounts for SecurityService Account Types; Virtual Accounts; Managed Service Accounts; SQL Server Services; How Service Accounts Can Become Compromised; Designing a Pragmatic Service Account Strategy; Summary; Chapter 8: Protecting Credentials; Protecting the sa Account; DBA Steps to Mitigate the Risks; Disabling the sa Account; Renaming the sa Account; Ensuring Reputability; Enforcing Constant Password Changes; Protecting User Accounts; Auditing Passwords Susceptible to Word List Attacks; Summary; Chapter 9: Reducing the Attack Surface; Network Configuration.
Record Nr. NYU-006186748
[Peter A. Carter]  
Materiale a stampa
Lo trovi qui: New York University
Managing Information Technology
Managing Information Technology
Creatore [Castillo, Francisco]
Estensione 1 online resource (246 pages)
Disciplina 004
Genere/Forma Electronic books
ISBN 9783319388915
3319388916
9783319388908
3319388908
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface; Acknowledgments; Contents; 1 Introduction; 2 IT Areas and Functions; 2.1#x83;Projects Versus Operations, Strategy Versus Operations; 2.2#x83;Systems, Processes, and People; 3 Organization and Human Resources; 4 Managing Operations; 4.1 Information Technology Service Management; 4.1.1 Service Desk (SD); 4.1.2 Technical Management (TM); 4.1.2.1 System Administration; 4.1.2.2 Database Administration; 4.1.2.3 Network Management; 4.1.2.4 Management of Servers and Storage; 4.1.2.5 Technical Management; 4.1.3 Application Management (AM); 4.1.3.1 Application Management: Incidence Handling.
4.1.3.2 Application Management: Development4.1.3.3 Application Management: Overall; 4.1.4 IT Operations Management (ITOM); 4.1.5 Field Support (FS); 4.1.6 Operations Head; 4.1.7 Operations Management Office; 4.1.8 Information Systems (IS) Head; 4.1.9 IT Infrastructure (II) Head; 4.2 IT Services Lifecycle; 4.3 Planning and Design Phase; 4.3.1 Change Management; 4.3.1.1 Prioritization; 4.3.2 Service Level Agreement (SLA); 4.4 Release Phase; 4.4.1 Testing; 4.4.2 Configuration Items; 4.4.3 The Configuration Management Database (CMDB); 4.4.3.1 Release Approval.
4.4.3.2 Documentation and Knowledge Base (KB)4.5 Maintenance Phase; 4.5.1 Event Management; 4.5.2 Incident Management; 4.5.3 Problem Management; 4.5.4 Request Fulfillment; 4.5.5 Access Management; 4.5.6 Capacity Management; 4.5.7 Availability Management; 4.5.8 IT Service Continuity Management; 4.5.9 Information Security Management; 4.5.10 Backup; 4.6 Retirement Phase; 4.7 IT Strategy; 4.8 Continual Service Improvement; References; Further Reading; 5 Managing Projects; 5.1 #x83;Project Management Principles; 5.1.1 Basic Principles and Characteristics of Projects; 5.1.2 Scope Management.
5.1.3 Procurement Management and Contracting5.1.4 Time Management; 5.1.5 Time-Cost-Quality Management; 5.1.6 Monitoring and Control; 5.1.7 Risk Management; 5.1.8 Knowledge Management; 5.1.9 Communication Management; 5.2 #x83;Project Documentation; 5.2.1 Analysis; 5.2.2 Design; 5.2.3 Cutover and Go Live Phase; 5.2.4 Closure; 5.3 FRICEW; 5.4 #x83;Implementation Strategy; 5.5 #x83;Testing; 5.6 #x83;Test Automation; 5.7 #x83;People Change Management; References; Further Reading; 6 Cut-Over into Operations; 6.1#x83;Backup and Restore Procedures; 6.2#x83;Release Management Procedures; 6.3#x83;Business Process; 6.4#x83;Data Migration.
6.5#x83;Cut-Over of Transactions and Data Quality6.6#x83;Interfaces; 6.7#x83;Support Strategies and Structures; Further Reading; 7 Project Governance; 7.1#x83;Overall IT Governance; 7.2#x83;Project Governance and Operations Governance; 7.3#x83;Project Monitoring and Control; 7.4#x83;Project Team Roles and Responsibilities; 7.5#x83;Communication Management; 7.6#x83;Scope Management (Including Change Requests); 7.7#x83;Risk Management; 7.8 Asset Management; 7.9 Issue Management; 7.10#x83;Release Management; 7.11#x83;Infrastructure Capacity Management; 7.12 Request Management for Projects; 7.13#x83;Code Development Guidelines.
Record Nr. NYU-006185439
[Castillo, Francisco]  
Materiale a stampa
Lo trovi qui: New York University
Digging into Software Knowledge Generation in Cultural Heritage : Modeling Assistance Strategies for Large Archaeological Data Sets
Digging into Software Knowledge Generation in Cultural Heritage : Modeling Assistance Strategies for Large Archaeological Data Sets
Creatore [Martin-Rodilla, Patricia]
Estensione 1 online resource (328 pages).
Disciplina 004
Genere/Forma Electronic books
ISBN 9783319691886
3319691880
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Foreword""; ""Preface""; ""Contents""; ""List of Figures""; ""Understanding Software Engineering and Archaeology Co-research""; ""1 Introduction""; ""Software Engineering and Archaeology, So Far Away?""; ""Illustrating Knowledge Generation Based on Archaeological Data""; ""Terminology Adoption""; ""Book Outline""; ""2 Prior Research Design""; ""Initial Questions and Goals""; ""â#x80;#x9C;Design Science Methodologyâ#x80;#x9D; in Practice""; ""Software Knowledge Generation Foundations""; ""3 Existing Techniques and Tools""; ""Introduction""; ""Tools for Detecting Conceptual Necessities""
""Conceptual Modeling as Knowledge Representation Technique""""Tools for Detecting Process Necessities""; ""Methods for Extracting and Characterizing Cognitive Processes in Knowledge Generation""; ""Extracting Cognitive Information from Textual Sources: Software Strategies""; ""Extracting Cognitive Information from Textual Sources: Discourse Strategies""; ""Existing Cognitive Processes Characterizations""; ""Theoretical Models for Knowledge Generation""; ""The Role of Cognitive Processes in Software Engineering""
""Characterizations of Cognitive Processes in Archaeology and Related Heritage Domains""""Tools for Detecting Interaction and Presentation Necessities""; ""Determining the Suitability of Interaction and Software Presentation Mechanisms""; ""4 Dealing with Archaeological Particularities""; ""Introduction""; ""Archaeological Consolidated Knowledge Particularities""; ""A Methodological Proposal for Integrating Discourse Analysis in Software Engineering""; ""ISO/IEC 24744 Standard""; ""The Proposed Methodology""; ""The Modeling Language for Discourse Analysis""; ""Occasion Relation""
""Background Relation""""Evaluation Relation""; ""Explanation Relation""; ""Parallelism Relation""; ""Elaboration Relation""; ""Exemplification Relation""; ""Generalization Relation""; ""Contrast Relation""; ""Violated Expectation Relation""; "" The Methodological Aspects""; ""Archaeological Cognitive Processes Particularities""; ""A Characterization of Cognitive Processes in Archaeology""; ""The Proposed Characterization""; ""The Application of the Characterization Obtained to Archaeology""; ""How to Validate Empirically Cognitive Processes in Software Assistance Contexts""
""The Validation of Cognitive Processes in Information Systems""""Validation Model Based on Thinking Aloud""; ""Tasks""; ""The Dynamics of the Sessions""; ""The Analysis of TAP Results and Complementary Data""; ""Archaeological Data Sets Visualization Particularities""; ""Approach for Studies of Information Visualization Techniques in Archaeology""; ""The Proposed Studies""; ""Conclusions""; ""5 Prior Empirical Results""; ""Introduction""; ""The Design of the Empirical Studies""; ""Empirical Studies""; ""Tools for Archaeological Process Necessities: Results""
Record Nr. NYU-006092743
[Martin-Rodilla, Patricia]  
Materiale a stampa
Lo trovi qui: New York University