Sciweavers

3926 search results - page 668 / 786
» Deriving Information Requirements from Responsibility Models
Sort
View
CORR
2011
Springer
212views Education» more  CORR 2011»
14 years 8 months ago
Decision Support Tools for Cloud Migration in the Enterprise
— This paper describes two tools that aim to support decision making during the migration of IT systems to the cloud. The first is a modeling tool that produces cost estimates of...
Ali Khajeh-Hosseini, Ian Sommerville, Jurgen Bogae...

Publication
397views
16 years 6 months ago
Build it but where? A GIS methodology for guiding the planning of new cycling facilities
Concern over climate change, traffic congestion, and the health consequences of sedentary lifestyles has resulted in a surge of interest in cycling as an efficient form of urban ...
Larsen, J. & El-Geneidy, M.
CORR
2010
Springer
121views Education» more  CORR 2010»
15 years 4 months ago
Interference Channel with an Out-of-Band Relay
A Gaussian interference channel (IC) with a relay is considered. The relay is assumed to operate over an orthogonal band with respect to the underlying IC, and the overall system i...
Onur Sahin, Osvaldo Simeone, Elza Erkip
140
Voted
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
14 years 11 months ago
On subspace identification of cascade structured systems
Subspace identification has proven useful when identifying identifying multi-input multi-output systems. It is, however, important in many applications to take a priori structural ...
Per Hagg, Bo Wahlberg, Henrik Sandberg
SACMAT
2003
ACM
15 years 9 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf