Sciweavers

2159 search results - page 394 / 432
» C-K design theory for information systems research
Sort
View
WWW
2007
ACM
16 years 2 months ago
Detecting near-duplicates for web crawling
Near-duplicate web documents are abundant. Two such documents differ from each other in a very small portion that displays advertisements, for example. Such differences are irrele...
Gurmeet Singh Manku, Arvind Jain, Anish Das Sarma
WWW
2004
ACM
16 years 2 months ago
Hybrid multicasting in large-scale service networks
The importance of service composition has been widely recognized in the Internet research community due to its high flexibility in allowing development of customized applications....
Jingwen Jin, Klara Nahrstedt
HICSS
2009
IEEE
74views Biometrics» more  HICSS 2009»
15 years 8 months ago
Unleashing Mobility in the Organization: A Time-Geography Perspective
The increased fluidity and agility of organizations demand the smooth mediation of information technology (IT) between user and task. As rigid hierarchies are giving way to open, ...
Douglas M. Schutz, Yong-Young Kim, Youngjin Yoo
GLOBECOM
2009
IEEE
15 years 8 months ago
QOMB: A Wireless Network Emulation Testbed
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...
167
Voted
IVIC
2009
Springer
15 years 8 months ago
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
Abstract. Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recen...
Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Con...