Sciweavers

118 search results - page 10 / 24
» Computational approaches for real-time extraction of soft bi...
Sort
View
HICSS
2009
IEEE
118views Biometrics» more  HICSS 2009»
15 years 4 months ago
FXplorer: Exploration of Computed Software Behavior - A New Approach to Understanding and Verification
The craft of software understanding and verification can benefit from technologies that enable evolution toward a true engineering discipline. In current practice, software develo...
Luanne Burns, Timothy Daly
HICSS
2002
IEEE
103views Biometrics» more  HICSS 2002»
15 years 2 months ago
Understanding and Selecting Knowledge Management Systems for a Health Information Provider
In the current market there is a proliferation of knowledge management software solutions. The aim of this paper is to discuss issues concerned in selecting such a system to suppo...
Gabby Fennessy
MEDIAFORENSICS
2010
14 years 8 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
BMCBI
2008
85views more  BMCBI 2008»
14 years 10 months ago
Normalizing biomedical terms by minimizing ambiguity and variability
Background: One of the difficulties in mapping biomedical named entities, e.g. genes, proteins, chemicals and diseases, to their concept identifiers stems from the potential varia...
Yoshimasa Tsuruoka, John McNaught, Sophia Ananiado...
ICASSP
2011
IEEE
14 years 1 months ago
Belief theoretic methods for soft and hard data fusion
In many contexts, one is confronted with the problem of extracting information from large amounts of different types soft data (e.g., text) and hard data (from e.g., physics-based...
Thanuka Wickramarathne, Kamal Premaratne, Manohar ...