Sciweavers

1272 search results - page 228 / 255
» On the nature of information systems strategy development
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 7 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
PAMI
2011
14 years 4 months ago
Latent Fingerprint Matching
Latent fingerprint identification is of critical importance in forensics. While tremendous progress has been made in the field of automatic fingerprint identification, latent...
Anil K. Jain, Jianjiang Feng
JAISE
2010
182views Algorithms» more  JAISE 2010»
14 years 4 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
ESWS
2011
Springer
14 years 1 months ago
FedX: A Federation Layer for Distributed Query Processing on Linked Open Data
Driven by the success of the Linked Open Data initiative today’s Semantic Web is best characterized as a Web of interlinked datasets. Hand in hand with this structure new challen...
Andreas Schwarte, Peter Haase, Katja Hose, Ralf Sc...
PERCOM
2005
ACM
15 years 9 months ago
TinyLIME: Bridging Mobile and Sensor Networks through Middleware
In the rapidly developing field of sensor networks, bridging the gap between the applications and the hardware presents a major challenge. Although middleware is one solution, it ...
Carlo Curino, Matteo Giani, Marco Giorgetta, Aless...