Sciweavers

108 search results - page 18 / 22
» A Provenance-Based Compliance Framework
Sort
View
JTAER
2006
100views more  JTAER 2006»
13 years 7 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
EDBTW
2010
Springer
14 years 2 months ago
Quantile-based bootstrap methods to generate continuous synthetic data
To face the increasing demand from users, National Statistical Institutes (NSI) release different information products. The dissemination of this information should be performed ...
Daniela Ichim
SCAM
2008
IEEE
14 years 1 months ago
Some Assembly Required - Program Analysis of Embedded System Code
Programming embedded system software typically involves more than one programming language. Normally, a high-level language such as C/C++ is used for application oriented tasks an...
Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seef...
SEW
2007
IEEE
14 years 1 months ago
Mapping CMMI Project Management Process Areas to SCRUM Practices
- Over the past years, the Capability Maturity Model (CMM) and Capability Maturity Model Integration (CMMI) have been broadly used for assessing organizational maturity and process...
Ana Sofia C. Marcal, Felipe Santana Furtado Soares...
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 1 months ago
Synthesis of analog filters on an evolvable hardware platform using a genetic algorithm
This work presents a novel approach to filter synthesis on a field programmable analog array (FPAA) architecture using a genetic algorithm (GA). First, a Matlab model of the FPA...
Joachim Becker, Stanis Trendelenburg, Fabian Henri...