Sciweavers

317 search results - page 32 / 64
» Typing References by Effect Inference
Sort
View
TSE
2008
128views more  TSE 2008»
14 years 9 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
TIFS
2010
127views more  TIFS 2010»
14 years 8 months ago
Audio authenticity: detecting ENF discontinuity with high precision phase analysis
—This paper addresses a forensic tool used to assess audio authenticity. The proposed method is based on detecting phase discontinuity of the power grid signal; this signal, refe...
Daniel Patricio Nicolalde Rodríguez, Jos&ea...
JASIS
2010
316views more  JASIS 2010»
14 years 8 months ago
Information sources and perceived success in corporate finance
: The work of corporate finance professionals is information intensive. In spite of that the practices and motivations of their information preferences have been researched very li...
Isto Huvila
PPPJ
2006
ACM
15 years 3 months ago
Cost and benefit of rigorous decoupling with context-specific interfaces
In Java programs, classes are coupled to each other through the use of typed references. In order to minimize coupling without changing the executed code, interfaces can be introd...
Florian Forster
VISUALIZATION
1992
IEEE
15 years 1 months ago
Display of Scientific Data Structures for Algorithm Visualization
algorithms as networks of modules. The data flow architecture is popular because of the flexibility of mixing calculation modules with display modules, and because of its easy grap...
William L. Hibbard, Charles R. Dyer, Brian E. Paul