Sciweavers

3151 search results - page 480 / 631
» Using query term order for result summarisation
Sort
View
ICPR
2008
IEEE
16 years 6 months ago
Securing fingerprint template: Fuzzy vault with minutiae descriptors
Fuzzy vault has been shown to be an effective technique for securing fingerprint minutiae templates. Its security depends on the difficulty in identifying the set of genuine minut...
Abhishek Nagar, Anil K. Jain, Karthik Nandakumar
MOBICOM
2006
ACM
15 years 11 months ago
Electromagnetic communications within swarms of autonomous underwater vehicles
Autonomous underwater vehicles (AUVs) have great value as platforms for sensors. While traditional AUVs have been large platforms that tend to operate alone or in very small group...
Michael R. Frater, Michael J. Ryan, Robin M. Dunba...
MIR
2004
ACM
110views Multimedia» more  MIR 2004»
15 years 11 months ago
Symbolic representation and retrieval of moving object trajectories
Searching moving object trajectories of video databases has been applied to many fields, such as video data analysis, content-based video retrieval, video scene classification. ...
Lei Chen 0002, M. Tamer Özsu, Vincent Oria
ACMICEC
2008
ACM
276views ECommerce» more  ACMICEC 2008»
15 years 7 months ago
A Bayesian network for IT governance performance prediction
The goal of IT governance is not only to achieve internal efficiency in an IT organization, but also to support IT's role as a business enabler. The latter is here denoted IT...
Mårten Simonsson, Robert Lagerström, Po...
ECIR
2010
Springer
15 years 7 months ago
Tripartite Hidden Topic Models for Personalised Tag Suggestion
Abstract. Social tagging systems provide methods for users to categorise resources using their own choice of keywords (or "tags") without being bound to a restrictive set...
Morgan Harvey, Mark Baillie, Ian Ruthven, Mark Jam...