Sciweavers

347 search results - page 55 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2003
IEEE
104views Biometrics» more  HICSS 2003»
15 years 3 months ago
Information Technology Investment and Adoption: A Rational Expectations Perspective
This study examines the potential applications of the Rational Expectations Hypothesis (REH) in information technology (IT) investment and adoption decisionmaking. Although REH ha...
Yoris A. Au, Robert J. Kauffman
HICSS
2003
IEEE
92views Biometrics» more  HICSS 2003»
15 years 3 months ago
Human-Robot Interaction for Intelligent Assisted Viewing During Teleoperation
The Visual Acts theory aims to provide intelligent assistance for camera viewpoint selection during teleoperation. It combines top-down partitioning of a task and bottom-up monito...
Gerard T. McKee, Bernard G. Brooks, Paul S. Schenk...
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
15 years 2 months ago
Nash Strategies for Load Serving Entities in Dynamic Energy Multi-markets
In this paper the problem of developing bidding strategies for the participants of dynamic energy-multi markets is studied. Attention is given to strategic bidding of load serving...
Jose B. Cruz Jr., Ashkan Kian
ICMI
2003
Springer
160views Biometrics» more  ICMI 2003»
15 years 3 months ago
Sensitivity to haptic-audio asynchrony
The natural role of sound in actions involving mechanical impact and vibration suggests the use of auditory display as an augmentation to virtual haptic interfaces. In order to bu...
Bernard D. Adelstein, Durand R. Begault, Mark R. A...
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 3 months ago
Pervasive Real-Time IT as a Disruptive Technology for the IS Field
This paper builds on ideas in a recent paper which argued that the core subject matter of the IS field should not be “the IT artifact” (as suggested by Orlikowski and Iacono [...
Steven Alter