Sciweavers

232 search results - page 36 / 47
» Ontology: its transformation from philosophy to information ...
Sort
View
CASES
2004
ACM
15 years 2 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
CAISE
2003
Springer
15 years 2 months ago
Managing Continuous Data Integration Flows
Understanding the performance and dynamic behavior of workflow is crucial in being able to modify, maintain, and improve it. A particularly difficult aspect of measuring the perfor...
Josef Schiefer, Jun-Jang Jeng, Robert M. Bruckner
EDOC
2009
IEEE
15 years 1 months ago
Enterprise Architecture Analysis for Data Accuracy Assessments
- Poor data in information systems impede the quality of decision-making in many modern organizations. Manual business process activities and application services are never execute...
Per Närman, Pontus Johnson, Mathias Ekstedt, ...
PAMI
2008
109views more  PAMI 2008»
14 years 9 months ago
Likelihood Ratio-Based Biometric Score Fusion
Multibiometric systems fuse information from different sources to compensate for the limitations in performance of individual matchers. We propose a framework for optimal combinati...
Karthik Nandakumar, Yi Chen, Sarat C. Dass, Anil K...
OTM
2005
Springer
15 years 2 months ago
Semantics of Agent-Based Service Delegation and Alignment
In this paper we will concentrate on the conceptual modeling and semantics of service delegation and alignment in information systems. In delegation, one typically has the situatio...
Herman Balsters, G. B. Huitema, Nicolae B. Szirbik