Sciweavers

982 search results - page 119 / 197
» The reflective transformative design process
Sort
View
147
Voted
VISUALIZATION
1995
IEEE
15 years 7 months ago
Iconic Techniques for Feature Visualization
This paper presents a conceptual framework and a process model for feature extraction and iconic visualization. Fearaction is viewed as a process of data abstraction, which can pr...
Frank J. Post, Theo van Walsum, Frits H. Post, Deb...
IQIS
2007
ACM
15 years 5 months ago
Towards a Benchmark for ETL Workflows
Extraction–Transform–Load (ETL) processes comprise complex data workflows, which are responsible for the maintenance of a Data Warehouse. Their practical importance is denoted...
Panos Vassiliadis, Anastasios Karagiannis, Vasilik...
155
Voted
ICIP
2010
IEEE
15 years 1 months ago
Rotation robust detection of copy-move forgery
Copy-move tampering is a common type of image synthesizing, where a part of an image is copied and pasted to another place to add or remove an object. In this paper, an efficient ...
Weihai Li, Nenghai Yu
141
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
A case study evaluation of maintainability and performance of persistency techniques
Efforts for software evolution supersede any other part of the software life cycle. Technological decisions have a major impact on the maintainability, but are not well reflected ...
Thomas Goldschmidt, Ralf Reussner, Jochen Winzen
CAISE
2009
Springer
15 years 10 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...