Sciweavers

3428 search results - page 206 / 686
» Making the Case
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 11 months ago
Operationalised Business Intelligence: Knowledge Sharing with an Enterprise Ambition at the Amsterdam-Amstelland Police Departme
In this article we describe the operationalised Business Intelligence (BI) environment of the Amsterdam-Amstelland Police Department (AAPD) as it presented itself in the spring of...
Stijn Viaene, Luc Lutin, Steven De Hertogh
DATE
2009
IEEE
106views Hardware» more  DATE 2009»
15 years 11 months ago
Generation of compact test sets with high defect coverage
Abstract-Multi-detect (N-detect) testing suffers from the drawback that its test length grows linearly with N. We present a new method to generate compact test sets that provide hi...
Xrysovalantis Kavousianos, Krishnendu Chakrabarty
MCETECH
2009
Springer
15 years 11 months ago
A Non-technical User-Oriented Display Notation for XACML Conditions
Access control rules are currently administered by highly qualified personnel. Thus, the technical barrier that specialized access control languages represent naturally prevents th...
Bernard Stepien, Amy P. Felty, Stan Matwin
CASES
2009
ACM
15 years 11 months ago
Parallel, hardware-supported interrupt handling in an event-triggered real-time operating system
A common problem in event-triggered real-time systems is caused by low-priority tasks that are implemented as interrupt handlers interrupting and disturbing high-priority tasks th...
Fabian Scheler, Wanja Hofer, Benjamin Oechslein, R...
127
Voted
ICASSP
2008
IEEE
15 years 11 months ago
Stability analysis of complex maximum likelihood ica using Wirtinger calculus
The desirable asymptotic optimality properties of the maximum likelihood (ML) estimator make it an attractive solution for performing independent component analysis (ICA) as well....
Hualiang Li, Tülay Adali