Sciweavers

4360 search results - page 710 / 872
» Socio-technical systems: From design methods to systems engi...
Sort
View
117
Voted
ICB
2007
Springer
195views Biometrics» more  ICB 2007»
15 years 5 months ago
Identity Verification by Using Handprint
In recent years, palmprint based personal identification has been extensively explored by researchers. The success of this technology has demonstrated that the inner part of palm s...
Ying Hao, Tieniu Tan, Zhenan Sun, Yufei Han
114
Voted
MTA
2010
141views more  MTA 2010»
14 years 11 months ago
Automatic tag expansion using visual similarity for photo sharing websites
Abstract In this paper we present an automatic photo tag expansion method designed for photo sharing websites. The purpose of the method is to suggest tags that are relevant to the...
Sare Gul Sevil, Onur Kucuktunc, Pinar Duygulu, Faz...
100
Voted
CODES
2007
IEEE
15 years 7 months ago
Smart driver for power reduction in next generation bistable electrophoretic display technology
Microencapsulated electrophoretic displays (EPDs) are quickly emerging as an important technology for use in battery-powered portable computing devices. Thanks to bistability and ...
Michael A. Baker, Aviral Shrivastava, Karam S. Cha...
144
Voted
OOPSLA
2007
Springer
15 years 7 months ago
Statistically rigorous java performance evaluation
Java performance is far from being trivial to benchmark because it is affected by various factors such as the Java application, its input, the virtual machine, the garbage collect...
Andy Georges, Dries Buytaert, Lieven Eeckhout
89
Voted
AVSS
2006
IEEE
15 years 7 months ago
Multimedia Surveillance and Monitoring
Most surveillance and monitoring systems nowadays utilize multiple types of sensors. However, due to the asynchrony among and diversity of sensors, information assimilation how to...
Mohan S. Kankanhalli