-
-
### Description
Prepare the elicitation questions for the project
### Required Activities
- [x] Prepare the elicitation questions
- [x] Link it to the sidebar
### Estimated Time
3
#…
-
This article I read was first introduced to me here: [https://www.forbes.com/sites/adigaskell/2018/07/18/how-to-build-successful-multi-cultural-teams/#579e20462cad](https://www.forbes.com/sites/adigas…
-
### Links
- Paper: https://dl.acm.org/citation.cfm?id=3132525.3132549
### Abstract
- Three-dimensional printed models have the potential to serve as powerful accessibility tools for blind people.…
-
@jandraor's paper on applying Bayesian workflow could be extended with SBC. Currently system dynamics model translators are progressed in parallel ([python](https://github.com/hyunjimoon/pysd/tree/sta…
-
Haven't seen updates since 2021. I've been looking for uses of ontology to derive threats from descriptions of infrastructure. This one at least derives them from DFDs, but in Threat Dragon format.
-
-
These are my first thoughts about the data entry side of node probabilities (not the elicitation of these values).
It is sensible to flag up when the probability distribution is not valid, i.e. the i…
-
File: [docs/reference/pkg/aws/lex/intent.md](https://www.pulumi.com/docs/reference/pkg/aws/lex/intent/)
The relevant part of the Python example reads:
```
...
value_elicit…
-
Objective: Hypothetically identify potential risks for the Mercado Colegial platform using scenario analysis and referencing the "Risk Analysis" topic covered in class, specifically the "Risk Identifi…