Sciweavers

2669 search results - page 389 / 534
» Improvement of a configuration management system
Sort
View
HICSS
2007
IEEE
143views Biometrics» more  HICSS 2007»
15 years 8 months ago
B-to-B E-Commerce: Assessing the Impacts of RFID Technology in a Five Layer Supply Chain
This paper attempts to track key performance indicators in order to assess the impacts of RFID technology in a five layer supply chain in the utility sector. Findings point to som...
Ygal Bendavid, Élisabeth Lefebvre, Louis A....
ISCAS
2007
IEEE
134views Hardware» more  ISCAS 2007»
15 years 8 months ago
Florida Wireless Implantable Recording Electrodes (FWIRE) for Brain Machine Interfaces
Abstract— This paper reviews on-going efforts towards the development of the Florida Wireless Implantable Recording Electrodes (FWIRE). The FWIRE microsystem platform is a fully ...
Rizwan Bashirullah, John G. Harris, Justin C. Sanc...
CCS
2007
ACM
15 years 7 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
ER
2007
Springer
125views Database» more  ER 2007»
15 years 7 months ago
On the Correlation between Process Model Metrics and Errors
Business process models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive ap...
Jan Mendling, Gustaf Neumann, Wil M. P. van der Aa...
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
15 years 7 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon