Sciweavers

107 search results - page 11 / 22
» ImageNotion: Methodology, Tool Support and Evaluation
Sort
View
ER
2008
Springer
136views Database» more  ER 2008»
13 years 8 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
14 years 1 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
DATE
1997
IEEE
75views Hardware» more  DATE 1997»
13 years 11 months ago
Using constraint logic programming in memory synthesis for general purpose computers
In modern computer systems the performance is dominated by the memory performance. Currently, there is neither a systematic design methodology nor a tool for the design of memory ...
Renate Beckmann, Jürgen Herrmann
OR
2006
Springer
13 years 6 months ago
An AHP model for construction contractor prequalification
Given that contractor plays a critical role in any construction project, contractor selection constitutes key decision for public authorities. Prequalification, i.e. the eliminati...
K. P. Anagnostopoulos, A. P. Vavatsikos
JCDL
2006
ACM
133views Education» more  JCDL 2006»
14 years 20 days ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke