Sciweavers

8468 search results - page 1568 / 1694
» The Technology of Data Stashing
Sort
View
FCCM
2002
IEEE
126views VLSI» more  FCCM 2002»
15 years 2 months ago
Hyperspectral Image Compression on Reconfigurable Platforms
NASA’s satellites currently do not make use of advanced image compression techniques during data transmission to earth because of limitations in the available platforms. With th...
Thomas W. Fry, Scott Hauck
HICSS
2002
IEEE
127views Biometrics» more  HICSS 2002»
15 years 2 months ago
What Does It Mean for an Organisation to Be Intelligent? Measuring Intellectual Bandwidth for Value Creation
The importance of electronic collaboration has risen as successful organisations recognize that they need to convert their intellectual resources into goods and services their cus...
Sajda Qureshi, Andries van der Vaart, Gijs Kauling...
DAS
2010
Springer
15 years 2 months ago
Document analysis issues in reading optical scan ballots
Optical scan voting is considered by many to be the most trustworthy option for conducting elections because it provides an independently verifiable record of each voter’s inte...
Daniel P. Lopresti, George Nagy, Elisa H. Barney S...
GECCO
2010
Springer
191views Optimization» more  GECCO 2010»
15 years 2 months ago
Initialization parameter sweep in ATHENA: optimizing neural networks for detecting gene-gene interactions in the presence of sma
Recent advances in genotyping technology have led to the generation of an enormous quantity of genetic data. Traditional methods of statistical analysis have proved insufficient i...
Emily Rose Holzinger, Carrie C. Buchanan, Scott M....
CCS
2009
ACM
15 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
« Prev « First page 1568 / 1694 Last » Next »