Sciweavers

110 search results - page 22 / 22
» Biometric Security Systems: Fingerprint and Speech Technolog...
Sort
View
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 3 months ago
Identifying Facilitators and Inhibitors of Market Structure Change: A Hybrid Theory of Unbiased Electronic Markets
The electronic markets hypothesis (EMH) in the information systems (IS) literature suggests that information technology (IT) will reduce coordination costs across firms, leading t...
Nelson F. Granados, Alok Gupta, Robert J. Kauffman
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 2 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
15 years 3 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
ISVC
2005
Springer
15 years 3 months ago
Investigating the Impact of Face Categorization on Recognition Performance
Face recognition is a key biometric technology with a wide range of potential applications both in government and private sectors. Despite considerable progress in face recognition...
Konstantinos Veropoulos, George Bebis, Michael A. ...
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
15 years 2 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic