Sciweavers

1566 search results - page 248 / 314
» Contification Using Dominators
Sort
View
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 8 months ago
Eigen-Analysis of UWB Channel on the Basis of Information Theoretic Criteria
— Underground mine galleries can be considered as complex transmission lines where multipath, attenuation, reflection, diffraction and scattering effects are dominants. However, ...
Abdellah Chehri, Paul Fortier, Pierre-Martin Tardi...
119
Voted
ICDM
2007
IEEE
124views Data Mining» more  ICDM 2007»
15 years 8 months ago
Local Probabilistic Models for Link Prediction
One of the core tasks in social network analysis is to predict the formation of links (i.e. various types of relationships) over time. Previous research has generally represented ...
Chao Wang, Venu Satuluri, Srinivasan Parthasarathy
IEEEARES
2007
IEEE
15 years 8 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul
BPM
2007
Springer
148views Business» more  BPM 2007»
15 years 8 months ago
Requirements-Driven Design and Configuration Management of Business Processes
The success of a business process (BP) depends on whether it meets its business goal as well as non-functional requirements associated with it. BP specifications frequently need to...
Alexei Lapouchnian, Yijun Yu, John Mylopoulos
ICB
2007
Springer
239views Biometrics» more  ICB 2007»
15 years 8 months ago
Uniprojective Features for Gait Recognition
Recent studies have shown that shape cues should dominate gait recognition. This motivates us to perform gait recognition through shape features in 2D human silhouettes. In this pa...
Daoliang Tan, Kaiqi Huang, Shiqi Yu, Tieniu Tan