Sciweavers

413 search results - page 52 / 83
» It outsourcing maturity model
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 6 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
ISMIR
2000
Springer
168views Music» more  ISMIR 2000»
15 years 4 months ago
Mel Frequency Cepstral Coefficients for Music Modeling
We examine in some detail Mel Frequency Cepstral Coefficients (MFCCs) - the dominant features used for speech recognition - and investigate their applicability to modeling music. ...
Beth Logan
87
Voted
IJON
2007
80views more  IJON 2007»
15 years 13 days ago
To each his own: The caregiver's role in a computational model of gaze following
We investigate a computational model of the emergence of gaze following that is based on a generic basic set of mechanisms. Whereas much attention has been focused so far on the s...
Christof Teuscher, Jochen Triesch
139
Voted
EMISA
2010
Springer
14 years 10 months ago
Supporting ad hoc Analyses on Enterprise Models
Abstract: Enterprises are socio technical systems whose management involves multiple stakeholders each demanding for a distinct perspective on the enterprise. A large number of mod...
Sabine Buckl, Jens Gulden, Christian M. Schweda
IDT
2008
123views more  IDT 2008»
15 years 17 days ago
A rich semantic model of track as a foundation for sharing beliefs regarding dynamic objects and events
: Many defense, homeland security, and commercial security objectives require continuous tracking of mobile entities such as aircraft. The systems that perform these functions prod...
Frederick Hayes-Roth, Curtis L. Blais