Sciweavers

124 search results - page 22 / 25
» A survey of research and practices of Network-on-chip
Sort
View
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 2 months ago
E-File Adoption: A Study of U.S. Taxpayers' Intentions
In the United States, congress has set goals for the diffusion of e-government initiatives. One of congressÂ’ goals for 2007 was for 80% of tax and informational returns to be fil...
L. Christian Schaupp, Lemuria Carter, Jeff Hobbs
IEEEIAS
2009
IEEE
14 years 2 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline
SAC
2004
ACM
14 years 1 months ago
The inheritance anomaly: ten years after
The term inheritance anomaly was coined in 1993 by Matsuoka and Yonezawa [15] to refer to the problems arising by the coexistence of inheritance and concurrency in concurrent obje...
Giuseppe Milicia, Vladimiro Sassone
ADAEUROPE
2001
Springer
14 years 3 days ago
Building Formal Requirements Models for Reliable Software
Requirements engineering (RE) is concerned with the elicitation of the goals to be achieved by the system envisioned, the operationalization of such goals into specifications of se...
Axel van Lamsweerde
LREC
2008
141views Education» more  LREC 2008»
13 years 9 months ago
All, and only, the Errors: more Complete and Consistent Spelling and OCR-Error Correction Evaluation
Some time in the future, some spelling error correction system will correct all the errors, and only the errors. We need evaluation metrics that will tell us when this has been ac...
Martin Reynaert