Sciweavers

3555 search results - page 109 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
127
Voted
IADIS
2003
15 years 5 months ago
Information Management and Interoperability Strategies: The Case for Digital Identifiers
The move from the current compartmentalised systems into an interoperable environment is the central challenge facing digital development this decade. In the quest for a semantic ...
Robin Wilson
100
Voted
ECIS
2001
15 years 5 months ago
Managing the Resourcing Process in an IT Outsourcing Environment: A Case Example
A case is described of a firm, which decided to develop a new IT system using a mixture of contract or outsourced workers and company employees. The company employees were placed ...
Sue Newell, Marward Maertens
134
Voted
ER
2007
Springer
138views Database» more  ER 2007»
15 years 5 months ago
Model-Driven Development Based Transformation of Stereotyped Class Diagrams to XML Schemas in a Healthcare Context
The health sector uses clinical guidelines as instruments for helping decision making. We are interested in the development of a ubiquitous decision support system (UDSS) for clini...
Eladio Domínguez, Jorge Lloret, Beatriz P&e...
112
Voted
LREC
2010
140views Education» more  LREC 2010»
15 years 5 months ago
Annotating Event Anaphora: A Case Study
In recent years we have resgitered a renewed interest in event detection and temporal processing of text/discourse. TimeML (Pustejovsky et al., 2003a) has shed new lights on the n...
Tommaso Caselli, Irina Prodanof
116
Voted
INFORMATICALT
2000
99views more  INFORMATICALT 2000»
15 years 3 months ago
Closed-loop Robust Identification Using the Direct Approach
Abstract. The aim of the given paper is a development of the direct approach used for the estimation of parameters of a closed-loop discrete-time dynamic system in the case of addi...
Rimantas Pupeikis