Sciweavers

485 search results - page 64 / 97
» Biometrics: A Grand Challenge
Sort
View
109
Voted
HICSS
2010
IEEE
224views Biometrics» more  HICSS 2010»
15 years 8 months ago
Finding Success in Rapid Collaborative Requirements Negotiation Using Wiki and Shaper
Defining requirements without satisfying success critical stakeholders often leads to expensive project failures. Enabling interdisciplinary stakeholders to rapidly and effectivel...
Di Wu, Da Yang, Barry W. Boehm
HICSS
2009
IEEE
153views Biometrics» more  HICSS 2009»
15 years 8 months ago
A Comparison of Maps and Signs for Ordered and Unordered Navigation Tasks in Virtual Worlds
Online 3D virtual worlds have many exciting and contemporary uses such as for social interaction, teaching and training, entertainment, and even for the development of virtual bus...
Daniel C. Cliburn, Todd Heino
HICSS
2009
IEEE
146views Biometrics» more  HICSS 2009»
15 years 8 months ago
A Dissemination Protocol to Guarantee Data Accessibility within N-Hops for Wireless Sensor Networks
One of the major challenges of designing a dissemination protocol for Wireless Sensor Networks (WSNs) is energy efficiency. Flooding and SPIN, which are very well-known proactive ...
Moonseong Kim, Matt W. Mutka, Sang-Hun Cho, Hyunse...
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 8 months ago
A Systematic Approach to Improve Communication for Emergency Response
The importance of communication, information sharing and interoperability in an emergency response scenario have risen recently based on the frequency of disasters throughout the ...
Raheleh B. Dilmaghani, Ramesh R. Rao
89
Voted
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 8 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...