Sciweavers

108 search results - page 18 / 22
» A Provenance-Based Compliance Framework
Sort
View
116
Voted
JTAER
2006
100views more  JTAER 2006»
15 years 1 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
87
Voted
EDBTW
2010
Springer
15 years 8 months ago
Quantile-based bootstrap methods to generate continuous synthetic data
To face the increasing demand from users, National Statistical Institutes (NSI) release different information products. The dissemination of this information should be performed ...
Daniela Ichim
94
Voted
SCAM
2008
IEEE
15 years 8 months ago
Some Assembly Required - Program Analysis of Embedded System Code
Programming embedded system software typically involves more than one programming language. Normally, a high-level language such as C/C++ is used for application oriented tasks an...
Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seef...
147
Voted
SEW
2007
IEEE
15 years 8 months ago
Mapping CMMI Project Management Process Areas to SCRUM Practices
- Over the past years, the Capability Maturity Model (CMM) and Capability Maturity Model Integration (CMMI) have been broadly used for assessing organizational maturity and process...
Ana Sofia C. Marcal, Felipe Santana Furtado Soares...
117
Voted
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 8 months ago
Synthesis of analog filters on an evolvable hardware platform using a genetic algorithm
This work presents a novel approach to filter synthesis on a field programmable analog array (FPAA) architecture using a genetic algorithm (GA). First, a Matlab model of the FPA...
Joachim Becker, Stanis Trendelenburg, Fabian Henri...