Sciweavers

74 search results - page 12 / 15
» Financially informed requirements prioritization
Sort
View
USS
2008
13 years 10 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
EUROPKI
2009
Springer
13 years 5 months ago
A Computational Framework for Certificate Policy Operations
The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
AMR
2006
Springer
119views Multimedia» more  AMR 2006»
13 years 9 months ago
The Potential of User Feedback Through the Iterative Refining of Queries in an Image Retrieval System
Inaccurate or ambiguous expressions in queries lead to poor results in information retrieval. We assume that iterative user feedback can improve the quality of queries. To this end...
Maher Ben Moussa, Marco Pasch, Djoerd Hiemstra, Pa...
FCCM
2004
IEEE
130views VLSI» more  FCCM 2004»
13 years 11 months ago
Hyperreconfigurable Architectures for Fast Run Time Reconfiguration
Dynamically reconfigurable architectures or systems are able to reconfigure their function and/or structure to suit changing needs of a computation during run time. The increasing...
Sebastian Lange, Martin Middendorf
ELPUB
2007
ACM
13 years 11 months ago
Technical Infrastructure and Policy Framework for Maximising the Benefits from Research Output
Electronic publishing is one part of a much larger process. There is a research lifecycle from creation of a programme for funded research through research proposals, projects, ou...
Keith G. Jeffery