Sciweavers

23 search results - page 3 / 5
» ei 2008
Sort
View
EDOC
2008
IEEE
14 years 1 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert
LREC
2008
137views Education» more  LREC 2008»
13 years 8 months ago
Elicited Imitation as an Oral Proficiency Measure with ASR Scoring
This paper discusses development and evaluation of a practical, valid and reliable instrument for evaluating the spoken language abilities of second-language (L2) learners of Engl...
C. Ray Graham, Deryle Lonsdale, Casey Kennington, ...
CLEIEJ
2004
123views more  CLEIEJ 2004»
13 years 6 months ago
BMM: A Business Modeling Method For Information Systems Development
An important premise of most of the contemporary methods for developing Software and Information Systems is that a good understanding of the application domain is essential for a ...
Jonás A. Montilva Calderón, Judith B...
JGT
2008
83views more  JGT 2008»
13 years 6 months ago
Monochromatic Hamiltonian t-tight Berge-cycles in hypergraphs
Abstract: In any r-uniform hypergraph H for 2 t r we define an runiform t-tight Berge-cycle of length , denoted by C(r,t) , as a sequence of distinct vertices v1, v2, . . . , v ,...
Paul Dorbec, Sylvain Gravier, Gábor N. S&aa...
CRITIS
2008
13 years 8 months ago
Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures
The interdependencies between infrastructures may be the cause of serious problems in mission/safety critical systems. In the CRUTIAL3 project the interdependencies between the ele...
Marco Beccuti, Giuliana Franceschinis, Mohamed Ka&...