Sciweavers

3272 search results - page 451 / 655
» Privacy in Data Publishing
Sort
View
ICSEA
2009
IEEE
15 years 11 months ago
A Software Requirements Change Source Taxonomy
— Requirements changes during software development pose a risk to cost, schedule and quality while at the same time providing an opportunity to add value. Provision of a generic ...
Sharon McGee, Des Greer
ICDIM
2008
IEEE
15 years 11 months ago
A framework for RESTful object exchange through schematized XML (unRESTricted)
Client-server architectures with clients on divergent platforms are in need of services that serve a high level of interoperability and a loose binding. It should be prevented tha...
Barbara Van De Keer, Dieter Van Rijsselbergen, Eri...
ISBI
2007
IEEE
15 years 10 months ago
Direct Reconstruction of Spiral Mri Using Least Squares Quantization Table
The least squares quantization table (LSQT) method is proposed to accelerate the direct Fourier transform for reconstructing images from nonuniformly sampled data, similar to the ...
Dong Liang, Edmund Y. Lam, George S. K. Fung
DASC
2006
IEEE
15 years 10 months ago
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems
Abstract— In stream authentication protocols used for largescale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and ...
Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Govern...
HICSS
2006
IEEE
110views Biometrics» more  HICSS 2006»
15 years 10 months ago
Risk Factors in Distributed Projects
In this manuscript we develop a conceptual understanding of how key risk factors associated with Information Technology development projects are magnified or multiplied when deali...
James M. Erickson, Roberto Evaristo