Sciweavers

4445 search results - page 719 / 889
» Reflective Authorization Systems
Sort
View
HICSS
2005
IEEE
116views Biometrics» more  HICSS 2005»
15 years 10 months ago
Why Does State Government Contract Out Their E-Government Services?
Contracting out government services, especially IT services, has accelerated in recent years in the United States. Based on literature in privatization and contracting out, the au...
Anna Ya Ni, Stuart Bretschneider
HICSS
2005
IEEE
99views Biometrics» more  HICSS 2005»
15 years 10 months ago
Impacts of Vertical IS Standards: The Case of the US Home Mortgage Industry
Vertical IS standards prescribe data structures and definitions, document formats, and business processes for particular industries, in contrast to horizontal IT standards, which ...
Rolf T. Wigand, Charles W. Steinfield, M. Lynne Ma...
ICMCS
2005
IEEE
151views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Face and Eye Rectification in Video Conference Using Artificial Neural Network
The lack of eye contact in video conference degrades the user’s experience. This problem has been known and studied for many years. There are hardware-based solutions to the eye...
Ben Yip
JCDL
2005
ACM
162views Education» more  JCDL 2005»
15 years 10 months ago
Integrating digital libraries and electronic publishing in the DART project
The Digital Anthropology Resources for Teaching (DART) project integrates the content acquisition and cataloging initiatives of a federated digital repository with the development...
Gordon Dahlquist, Brian Hoffman, David Millman
MIR
2005
ACM
115views Multimedia» more  MIR 2005»
15 years 10 months ago
Inferring similarity between music objects with application to playlist generation
The growing libraries of multimedia objects have increased the need for applications that facilitate search, browsing, discovery, recommendation and playlist construction. Many of...
Robert Ragno, Christopher J. C. Burges, Cormac Her...