Sciweavers

2309 search results - page 168 / 462
» Patterns for Technology Companies
Sort
View
125
Voted
COMPUTER
2010
147views more  COMPUTER 2010»
15 years 5 months ago
Authentication by Biometric Verification
:-Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human b...
Ron Vetter
WWW
2007
ACM
16 years 5 months ago
U-REST: an unsupervised record extraction system
In this paper, we describe a system that can extract record structures from web pages with no direct human supervision. Records are commonly occurring HTML-embedded data tuples th...
Yuan Kui Shen, David R. Karger
SIGCSE
2009
ACM
119views Education» more  SIGCSE 2009»
16 years 5 months ago
The summer academy for advancing deaf and hard of hearing in computing
Deaf and hard of hearing students are an underrepresented group in computing and face extra challenges in university-level computing courses. This paper describes a 9-week Summer ...
Anna Cavender, Richard E. Ladner, Robert I. Roth
WECWIS
2009
IEEE
198views ECommerce» more  WECWIS 2009»
15 years 11 months ago
Bridging the Gap between User Attributes and Service Policies with Attribute Mapping
—People, companies, and public authorities can now have a strong on-line presence and a huge amount of interactions on the Internet, made possible by the impressive growth of the...
Davide Cerri, Francesco Corcoglioniti
143
Voted
PROFES
2009
Springer
15 years 11 months ago
Integrating Value and Utility Concepts into a Value Decomposition Model for Value-Based Software Engineering
Value-based software engineering (VBSE) is an emerging stream of research that addresses the value considerations of software and extends the traditional scope of software engineer...
Mikko Rönkkö, Christian Frühwirth, ...