Sciweavers

347 search results - page 44 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
15 years 3 months ago
Fault Analysis of a Distributed Flight Control System
This paper presents how state consistency among distributed control nodes is maintained in the presence of faults. We analyze a fault tolerant semi-synchronous architecture concep...
Kristina Forsberg, Simin Nadjm-Tehrani, Jan Torin
HICSS
2009
IEEE
112views Biometrics» more  HICSS 2009»
15 years 4 months ago
Optimal Pumping Schedule and Salinity Control in a Coastal Aquifer: a Decision Support System
Proper management of coastal wells is important in order to satisfy demand, minimize costs, control salinity increase, and ultimately to define water resource strategies which are...
T. Ka'eo Duarte, Riccardo Minciardi, Michela Robba...
HICSS
2007
IEEE
179views Biometrics» more  HICSS 2007»
15 years 4 months ago
Assessing User Acceptance of a Knowledge Management System in a Global Bank: Process Analysis and Concept Development
Many organizations pursue knowledge management (KM) initiatives, with different degrees of success. One key aspect of KM often neglected in practice is that it not only concerns t...
Cristof Bals, Stefan Smolnik, Gerold Riempp
HICSS
2006
IEEE
101views Biometrics» more  HICSS 2006»
15 years 4 months ago
IT Projects: Conflict, Governance, and Systems Thinking
Triggered by several embarrassing (and costly) IT project collapses in New Zealand’s public sector, a government report found that effective project control required good govern...
David Johnstone, Sid L. Huff, Beverley G. Hope
HICSS
2010
IEEE
144views Biometrics» more  HICSS 2010»
15 years 4 months ago
Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter
Twitter—a microblogging service that enables users to post messages (“tweets”) of up to 140 characters—supports a variety of communicative practices; participants use Twit...
Danah Boyd, Scott Golder, Gilad Lotan