Sciweavers

1989 search results - page 282 / 398
» Integrity Management in Component Based Systems
Sort
View
205
Voted
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 10 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
ACMDIS
2006
ACM
15 years 10 months ago
Investigating design knowledge reuse for interface development
Reusing HCI design knowledge shows potential in allowing practitioners to design based on previously identified concerns. A reuse approach is presented that is based on claims, de...
Shahtab Wahid
CORR
2007
Springer
58views Education» more  CORR 2007»
15 years 4 months ago
Electromechanical Reliability Testing of Three-Axial Silicon Force Sensors
This paper reports on the systematic electromechanical characterization of a new three-axial force sensor used in dimensional metrology of micro components. The silicon based sens...
Stefan Spinner, J. Bartholomeyczik, Bernd Becker, ...
IJACTAICIT
2010
175views more  IJACTAICIT 2010»
15 years 2 months ago
Achieving CMMI Maturity Level 3 by Implementing FEAF Reference Models
The basic purpose of an Enterprise Architecture project is creating integrity among different enterprise components, including processes, systems, technologies, and etc. While CMM...
Fatemeh Kafili Kasmaee, Ramin Nassiri, Gholamreza ...
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 9 months ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...