Sciweavers

3771 search results - page 625 / 755
» Subobject Transformation Systems
Sort
View
142
Voted
CCECE
2006
IEEE
15 years 9 months ago
Person Identification using Electrocardiograms
In this paper, the authors present an evaluation of a new biometric based on electrocardiogram (ECG) waveforms. ECG data were collected from 50 subjects during 3 data recordings s...
Adrian D. C. Chan, Mohyledin M. Hamdy, Armin Badre...
117
Voted
HICSS
2006
IEEE
128views Biometrics» more  HICSS 2006»
15 years 9 months ago
Should I Stay or Should I Go? Worker Commitment to Virtual Organizations
As society enters the twenty-first century there is a growing realization that information technology (IT) is heavily influencing organizational structures [1]. One such structure...
Yulin Fang, Derrick J. Neufeld
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
15 years 9 months ago
Using Social Network Analysis to Test an IT-Enabled Business Process Reengineering Theory
After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) ...
Nik R. Hassan, Tom C. Richards, Jack D. Becker
HICSS
2006
IEEE
113views Biometrics» more  HICSS 2006»
15 years 9 months ago
Examining Cross-Agency Collaborations in E-Government Initiatives
Cross-agency collaborations are critical to the success of e-government, which has great potential to transform the way that governments work, share information and deliver servic...
Paul Jen-Hwa Hu, Dai Cui, Alan Charles Sherwood
233
Voted
ICDM
2006
IEEE
145views Data Mining» more  ICDM 2006»
15 years 9 months ago
Stability Region Based Expectation Maximization for Model-based Clustering
In spite of the initialization problem, the ExpectationMaximization (EM) algorithm is widely used for estimating the parameters in several data mining related tasks. Most popular ...
Chandan K. Reddy, Hsiao-Dong Chiang, Bala Rajaratn...