The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
We delineate an integrative view of interorganizational knowledge transfer (IOKT) in the upstream supply chain relationship from a buyer’s perspective. For this purpose, we sugg...
Modern real-time systems must be designed to be highly adaptable, reacting to aperiodic events in a predictable manner and exhibiting graceful degradation in overload scenarios wh...
George Lima, Eduardo Camponogara, Ana Carolina Sok...
This paper examines the opportunity of using compression for accelerating the (re)configuration of FPGA devices, focusing on the choice of compression algorithms, and their hardwa...
: The SIFT algorithm (Scale Invariant Feature Transform) proposed by Lowe [1] is an approach for extracting distinctive invariant features from images. It has been successfully app...