Sciweavers

485 search results - page 28 / 97
» Biometrics: A Grand Challenge
Sort
View
139
Voted
UDM
2005
IEEE
15 years 7 months ago
Challenges and Opportunities of Context-Aware Information Access
Ubiquitous computing environments embedding a wide range of pervasive computing technologies provide a challenging and exciting new domain for information access. Individuals work...
Gareth J. F. Jones
99
Voted
HICSS
2009
IEEE
190views Biometrics» more  HICSS 2009»
15 years 8 months ago
Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis
This paper describes the issues and challenges for real-time knowledge discovery and then discusses approaches and challenges for real-time data mining and stream mining. Our goal...
Bhavani M. Thuraisingham, Latifur Khan, Murat Kant...
HICSS
2003
IEEE
109views Biometrics» more  HICSS 2003»
15 years 7 months ago
The 'Vanishing' IT Productivity: A Simple Theory
The perceived phenomenon that huge investments in information technology (IT) over the past four decades have yielded a very small gain in productivity has been dubbed the “IT p...
Effy Oz
ACL2
2006
ACM
15 years 7 months ago
A verifying core for a cryptographic language compiler
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code.1 We report the use of ACL2 in building a verifying compiler f...
Lee Pike, Mark Shields, John Matthews
ICCS
2004
Springer
15 years 7 months ago
Computational Engineering and Science Program at the University of Utah
We summarize the Computational Engineering and Science program at the University of Utah. Program requirements as well as related research areas are outlined. To obtain the MS degr...
Carleton DeTar, Aaron L. Fogelson, Christopher R. ...