Sciweavers

2981 search results - page 496 / 597
» Answer Set Planning
Sort
View
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
15 years 11 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer
AICCSA
2005
IEEE
86views Hardware» more  AICCSA 2005»
15 years 11 months ago
Preemptive rate-based operator scheduling in a data stream management system
Data Stream Management Systems are being developed to process continuous queries over multiple data streams. These continuous queries are typically used for monitoring purposes wh...
Mohamed A. Sharaf, Panos K. Chrysanthis, Alexandro...
CCGRID
2005
IEEE
15 years 11 months ago
Servicing range queries on multidimensional datasets with partial replicas
Partial replication is one type of optimization to speed up execution of queries submitted to large datasets. In partial replication, a portion of the dataset is extracted, re-org...
Li Weng, Ümit V. Çatalyürek, Tahs...
DSN
2005
IEEE
15 years 11 months ago
User Interface Dependability through Goal-Error Prevention
User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applica...
Robert W. Reeder, Roy A. Maxion
HICSS
2005
IEEE
370views Biometrics» more  HICSS 2005»
15 years 11 months ago
Strategic Information Technology Management: Managing Organizational, Political, and Technological Forces
This paper explores the role of Information Technology (IT) in the management of municipally-owned and operated public utilities. Through semi-structured interviews of senior mana...
Keith Schildt, Suzanne Beaumaster, Marcie Edwards