This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
Abstract. This paper presents a case study on retrospective verication of the Linux Virtual File System (VFS), which is aimed at checking for violations of API usage rules and mem...
The development of a highly configurable data management system is a challenging task, especially if it is to be implemented on an embedded system that provides limited resources...
Returns caused by the delivery of incorrect items constitute a major problem for non-automated warehouses. Returns not only create extra costs, they also aggravate customers. Most...
Christian Prause, Markus Eisenhauer, Lukas Gillman...
Recent years have seen growth in the number of algorithms designed to solve challenging simulation-based nonlinear optimization problems. One such algorithm is the Trust-Region Par...
We present a case study of an international distance education course involving two sites in the US and one site in Pakistan. We use the case study to examine the elements of the ...
Richard J. Anderson, Ruth E. Anderson, Natalie Lin...
: Software qualities are in many cases tacit and hard to measure. Thus, there is a potential risk that they get lower priority than deadlines, cost and functionality. This paper pr...
The FlexRay bus is the prospective automotive standard communication system. For the sake of a high flexibility, the protocol includes a static time-triggered and a dynamic event...