Sciweavers

2299 search results - page 426 / 460
» Logical Data Expiration
Sort
View
HICSS
2002
IEEE
87views Biometrics» more  HICSS 2002»
14 years 20 days ago
Using Enterprise Reference Models for Automated ISO 9000 Compliance Evaluation
A computational enterprise model representing key facets of an organization can be an effective tool. For example, a specific organization's quality management business proce...
Henry M. Kim, Mark S. Fox
SEMWEB
2001
Springer
14 years 4 days ago
The ICS-FORTH RDFSuite: Managing Voluminous RDF Description Bases
Metadata are widely used in order to fully exploit information resources available on corporate intranets or the Internet. The Resource Description Framework (RDF) aims at facilit...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...
ICEIS
2000
IEEE
14 years 4 days ago
A Holistic Information Systems Strategy for Organisational Management-HISSOM
Alignment of organisational strategy with Information Systems Strategy (ISS) has become critical as adoption of Information Systems (IS) over the last 50 years has escalated. IS c...
David Lanc, Lachlan M. MacKinnon
VTS
2000
IEEE
89views Hardware» more  VTS 2000»
14 years 3 days ago
Fault Escapes in Duplex Systems
Hardware duplication techniques are widely used for concurrent error detection in dependable systems to ensure high availability and data integrity. These techniques are vulnerabl...
Subhasish Mitra, Nirmal R. Saxena, Edward J. McClu...
FCCM
1999
IEEE
134views VLSI» more  FCCM 1999»
14 years 1 days ago
Runlength Compression Techniques for FPGA Configurations
The time it takes to reconfigure FPGAs can be a significant overhead for reconfigurable computing. In this paper we develop new compression algorithms for FPGA configurations that...
Scott Hauck, William D. Wilson