Sciweavers

456 search results - page 11 / 92
» Qualitative System Identification from Imperfect Data
Sort
View
BIOSIG
2009
136views Biometrics» more  BIOSIG 2009»
14 years 7 months ago
Tamper-proof and Privacy-protected Fingerprint Identification Systems
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
Michael Schwaiger
BMCBI
2010
164views more  BMCBI 2010»
14 years 7 months ago
Merged consensus clustering to assess and improve class discovery with microarray data
Background: One of the most commonly performed tasks when analysing high throughput gene expression data is to use clustering methods to classify the data into groups. There are a...
T. Ian Simpson, J. Douglas Armstrong, Andrew P. Ja...
ICC
2008
IEEE
119views Communications» more  ICC 2008»
15 years 4 months ago
Wavelet-Based SNR Analysis in Building Satellite Terminal Fault Identification System
—With the rapid expansion of satellite communication, an increasing number of unattended ground terminals are spreading out to serve local customers. And there is a great demand ...
Liang Xu, Changcheng Huang
ECIS
2003
14 years 11 months ago
Reflections on the use of grounded theory in interpretive information systems research
In Information Systems research there are a growing number of studies that must necessarily draw upon the contexts, experiences and narratives of practitioners. This calls for res...
Jim Hughes, Steven Jones
AUTOMATICA
2010
96views more  AUTOMATICA 2010»
14 years 9 months ago
On resampling and uncertainty estimation in Linear System Identification
Linear System Identification yields a nominal model parameter, which minimizes a specific criterion based on the single inputoutput data set. Here we investigate the utility of va...
Simone Garatti, Robert R. Bitmead