Sciweavers

3771 search results - page 377 / 755
» Subobject Transformation Systems
Sort
View
ICAI
2004
15 years 6 months ago
Use of Histogram Distances in Iris Authentication
Quantitatively establishing the discriminative power of iris biometric data is considered. Multi-level 2D wavelet transform has been widely used for iris verification system. Whil...
Seung-Seok Choi, Sungsoo Yoon, Sung-Hyuk Cha, Char...
127
Voted
WICSA
2001
15 years 6 months ago
A Compositional Approach for Constructing Connectors
Increasingly, systems are composed from independently developed parts, and mechanisms that allow those parts to interact (connectors). In many situations, specialized forms of int...
Bridget Spitznagel, David Garlan
122
Voted
AEI
2008
108views more  AEI 2008»
15 years 5 months ago
Combinatorial synthesis approach employing graph networks
The paper proposes a methodology to assist the designer at the initial stages of the design synthesis process by enabling him/her to employ knowledge and algorithms existing in gr...
Offer Shai, Noel Titus, Karthik Ramani
COMPUTER
2006
160views more  COMPUTER 2006»
15 years 5 months ago
Developing Applications Using Model-Driven Design Environments
Model-driven development (MDD) is an emerging paradigm that improves the software development lifecycle, particularly for large software systems by providing a higherabstraction fo...
Krishnakumar Balasubramanian, Aniruddha S. Gokhale...
IS
2007
15 years 4 months ago
Improving process models by discovering decision points
Workflow management systems (WfMS) are widely used by business enterprises as tools for administrating, automating and scheduling the business process activities with the availab...
Sharmila Subramaniam, Vana Kalogeraki, Dimitrios G...