Sciweavers

413 search results - page 52 / 83
» It outsourcing maturity model
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 2 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
ISMIR
2000
Springer
168views Music» more  ISMIR 2000»
14 years 2 days ago
Mel Frequency Cepstral Coefficients for Music Modeling
We examine in some detail Mel Frequency Cepstral Coefficients (MFCCs) - the dominant features used for speech recognition - and investigate their applicability to modeling music. ...
Beth Logan
IJON
2007
80views more  IJON 2007»
13 years 8 months ago
To each his own: The caregiver's role in a computational model of gaze following
We investigate a computational model of the emergence of gaze following that is based on a generic basic set of mechanisms. Whereas much attention has been focused so far on the s...
Christof Teuscher, Jochen Triesch
EMISA
2010
Springer
13 years 6 months ago
Supporting ad hoc Analyses on Enterprise Models
Abstract: Enterprises are socio technical systems whose management involves multiple stakeholders each demanding for a distinct perspective on the enterprise. A large number of mod...
Sabine Buckl, Jens Gulden, Christian M. Schweda
IDT
2008
123views more  IDT 2008»
13 years 8 months ago
A rich semantic model of track as a foundation for sharing beliefs regarding dynamic objects and events
: Many defense, homeland security, and commercial security objectives require continuous tracking of mobile entities such as aircraft. The systems that perform these functions prod...
Frederick Hayes-Roth, Curtis L. Blais