Sciweavers

3555 search results - page 109 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
105
Voted
IADIS
2003
15 years 2 months ago
Information Management and Interoperability Strategies: The Case for Digital Identifiers
The move from the current compartmentalised systems into an interoperable environment is the central challenge facing digital development this decade. In the quest for a semantic ...
Robin Wilson
ECIS
2001
15 years 2 months ago
Managing the Resourcing Process in an IT Outsourcing Environment: A Case Example
A case is described of a firm, which decided to develop a new IT system using a mixture of contract or outsourced workers and company employees. The company employees were placed ...
Sue Newell, Marward Maertens
ER
2007
Springer
138views Database» more  ER 2007»
15 years 3 months ago
Model-Driven Development Based Transformation of Stereotyped Class Diagrams to XML Schemas in a Healthcare Context
The health sector uses clinical guidelines as instruments for helping decision making. We are interested in the development of a ubiquitous decision support system (UDSS) for clini...
Eladio Domínguez, Jorge Lloret, Beatriz P&e...
LREC
2010
140views Education» more  LREC 2010»
15 years 2 months ago
Annotating Event Anaphora: A Case Study
In recent years we have resgitered a renewed interest in event detection and temporal processing of text/discourse. TimeML (Pustejovsky et al., 2003a) has shed new lights on the n...
Tommaso Caselli, Irina Prodanof
INFORMATICALT
2000
99views more  INFORMATICALT 2000»
15 years 1 months ago
Closed-loop Robust Identification Using the Direct Approach
Abstract. The aim of the given paper is a development of the direct approach used for the estimation of parameters of a closed-loop discrete-time dynamic system in the case of addi...
Rimantas Pupeikis