Sciweavers

2826 search results - page 102 / 566
» A resource-based analysis of IT sourcing
Sort
View
CSMR
2007
IEEE
14 years 4 months ago
How Clones are Maintained: An Empirical Study
Despite the conventional wisdom concerning the risks related to the use of source code cloning as a software development strategy, several studies appeared in literature indicated...
Lerina Aversano, Luigi Cerulo, Massimiliano Di Pen...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 4 months ago
Filtering Spam Email Based on Retry Patterns
— A central problem in today’s Internet is unsolicited bulk email: spam. The SMTP protocol lacks a mechanism for verifying the source of a message, and respective protocol exte...
Peter Lieven, Björn Scheuermann, Michael Stin...
IJON
2006
77views more  IJON 2006»
13 years 10 months ago
Robust extraction of specific signals with temporal structure
There is a trend to develop blind or semi-blind source extraction algorithms based on second-order statistics, due to its low computation load and fast processing speed. An import...
Zhi-Lin Zhang, Zhang Yi
ICASSP
2011
IEEE
13 years 1 months ago
Function of Phase-Distortion for glottal model estimation
In voice analysis, the parameters estimation of a glottal model, an analytic description of the deterministic component of the glottal source, is a challenging question to assess ...
Gilles Degottex, Axel Röbel, Xavier Rodet
BPM
2009
Springer
134views Business» more  BPM 2009»
14 years 4 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer