Sciweavers

565 search results - page 98 / 113
» A Study on Successful Business Intelligence Systems in Pract...
Sort
View
ICPR
2010
IEEE
15 years 1 months ago
A Self-Training Learning Document Binarization Framework
—Document Image Binarization techniques have been studied for many years, and many practical binarization techniques have been developed and applied successfully on commercial do...
Bolan Su, Shijian Lu, Chew Lim Tan
HICSS
2009
IEEE
195views Biometrics» more  HICSS 2009»
15 years 8 months ago
Cyber Migration: An Empirical Investigation on Factors that Affect Users' Switch Intentions in Social Networking Sites
In recent years, Social Networking Sites (SNSs) have increasingly gained popularity. With the existence of hundreds of such sites, it is not uncommon to have users switching betwe...
Zengyan Cheng, Yinping Yang, John Lim
WISTP
2009
Springer
15 years 8 months ago
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnera...
Emmanuelle Dottax, Christophe Giraud, Matthieu Riv...
INFOCOM
1994
IEEE
15 years 5 months ago
Dynamic Bandwidth Allocation for Efficient Transport of Real-Time VBR Video over ATM
This pape? presents a novel approach to dynamic transmission bandwidth allocation for transport of real-time variable-bit-rate video in ATM networks. Describe video traffic in the...
Song Chong, San-qi Li, Joydeep Ghosh
CHI
1992
ACM
15 years 5 months ago
Gardeners and Gurus: Patterns of Cooperation Among CAD Users
We studied CAD system users to find out how they use the sophisticated customization and extension facilities offered by many CAD products. We found that users of varying levels o...
Michelle Gantt, Bonnie A. Nardi