Sciweavers

347 search results - page 39 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2006
IEEE
88views Biometrics» more  HICSS 2006»
15 years 4 months ago
The Mediating Roles of Third Party Organizations in ECR Adoption
The adoption of Efficient Consumer Response (ECR) by the grocery industry has become increasingly important in order to stay competitive. Due to the inter-organizational nature of...
Sherah Kurnia, Robert B. Johnston, Alexandra Dare
HICSS
2006
IEEE
83views Biometrics» more  HICSS 2006»
15 years 4 months ago
Vigilance and Error Detection in an Automated Command and Control Environment
This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
David P. Biros, Kent Marett, Brent T. Langhals
EWCBR
2008
Springer
14 years 11 months ago
Case-Based Decision Support for Patients with Type 1 Diabetes on Insulin Pump Therapy
Abstract. This paper presents a case-based approach to decision support for diabetes management in patients with Type 1 diabetes on insulin pump therapy. To avoid serious disease c...
Cindy Marling, Jay Shubrook, Frank Schwartz
HICSS
2005
IEEE
176views Biometrics» more  HICSS 2005»
15 years 3 months ago
Architecture for Customer Relationship Management Approaches in Financial Services
The majority of financial services companies in Germany and Switzerland have, with varying objectives and success, conducted customer relationship management (CRM) implementation ...
Malte Geib, Annette Reichold, Lutz Kolbe, Walter B...
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 3 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli