Sciweavers

342 search results - page 67 / 69
» Reuse, Standardization, and Transformation of Requirements
Sort
View
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
14 years 1 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
RWEB
2007
Springer
14 years 1 months ago
Semantic Descriptions in an Enterprise Search Solution
Today customers want to use powerful search engines for their huge and increasing content repositories. Full-text-only products with simple result lists are not enough to satisfy t...
Uwe Crenze, Stefan Köhler, Kristian Hermsdorf...
PLDI
2006
ACM
14 years 1 months ago
SAFECode: enforcing alias analysis for weakly typed languages
Static analysis of programs in weakly typed languages such as C and C++ is generally not sound because of possible memory errors due to dangling pointer references, uninitialized ...
Dinakar Dhurjati, Sumant Kowshik, Vikram S. Adve
KES
2005
Springer
14 years 26 days ago
Ontology Modeling and Storage System for Robot Context Understanding
Abstract. A mobile robot that interacts with its environment needs a machineunderstandable representation of objects and their usages. We present an ontology of objects, with gener...
Eric Wang, Yong Se Kim, Hak Soo Kim, Jin Hyun Son,...
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
14 years 19 days ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic