Sciweavers

1425 search results - page 249 / 285
» The combined ISAC-ER methodology of information systems deve...
Sort
View
ICPR
2006
IEEE
15 years 10 months ago
Pores and Ridges: Fingerprint Matching Using Level 3 Features
Fingerprint friction ridge details are generally described in a hierarchical order at three levels, namely, Level 1 (pattern), Level 2 (minutiae points) and Level 3 (pores and rid...
Anil K. Jain, Meltem Demirkus, Yi Chen
CHI
2004
ACM
15 years 10 months ago
Breaking the book: translating the chemistry lab book into a pervasive computing lab environment
The UK e-Science programme is relying on the evolution of the paper lab book into a pervasive data gathering lab system. To date take up of existing commercial or research lab boo...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...
GROUP
2005
ACM
15 years 3 months ago
Follow the (slash) dot: effects of feedback on new members in an online community
Many virtual communities involve ongoing discussions, with large numbers of users and established, if implicit rules for participation. As new users enter communities like this, b...
Cliff Lampe, Erik W. Johnston
HPDC
2002
IEEE
15 years 2 months ago
Predicting Sporadic Grid Data Transfers
The increasingly common practice of replicating datasets and using resources as distributed data stores in Grid environments has led to the problem of determining which replica ca...
Sudharshan Vazhkudai, Jennifer M. Schopf
USS
2008
15 years 2 days ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May