Sciweavers

87 search results - page 12 / 18
» BIM: A Methodology to Transform Business Processes into Soft...
Sort
View
DRM
2007
Springer
14 years 2 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
IAT
2010
IEEE
13 years 5 months ago
Modular JADE Agents Design and Implementation Using ASEME
ASEME is an emerging Agent Oriented Software Engineering (AOSE) methodology. The Model-Driven Engineering (MDE) paradigm encourages software modelers to automate the transition of...
Nikolaos I. Spanoudakis, Pavlos Moraitis
AGILEDC
2003
IEEE
14 years 1 months ago
Agile Development in the old economy
As part of the delivery an automated hub for a postal operator, the Solystic company has to build a complex and feature rich Information System that supports a highly automated pr...
Géry Derbier
WER
2004
Springer
14 years 1 months ago
A pattern language to join early and late requirements
At present, the early phase of Requirements Engineering is a new research area in the Software Engineering field. This phase is concerned with the analysis of the organizational c...
Alicia Martínez, Oscar Pastor, Hugo Estrada
CIDR
2011
224views Algorithms» more  CIDR 2011»
12 years 11 months ago
Transactional Intent
Data state in a data management system such as a database is the result of the transactions performed on that data management system. Approaches such as single-message transaction...
Shel Finkelstein, Thomas Heinzel, Rainer Brendle, ...