Sciweavers

3193 search results - page 605 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 1 months ago
The Mobile Internet: The Pioneering Users' Adoption Decisions
Substantial financial and technological investments by private and public organizations have resulted in the delivery of the third generation mobile technologies, although the jou...
Ann Fogelgren-Pedersen
SAC
2004
ACM
14 years 1 months ago
Creation and management of versions in multiversion data warehouse
A data warehouse (DW) provides an information for analytical processing, decision making, and data mining tools. On the one hand, the structure and content of a data warehouse ref...
Bartosz Bebel, Johann Eder, Christian Koncilia, Ta...
AUIC
2000
IEEE
14 years 3 days ago
Finger Tracking for the Digital Desk
A trend in computing environments today is to move towards more ‘natural’ interaction, another is to make hardware invisible to the user. Both these ideas converge into ubiqui...
Thomas Brown, Richard C. Thomas
FGR
1998
IEEE
203views Biometrics» more  FGR 1998»
13 years 12 months ago
Automated Facial Expression Recognition Based on FACS Action Units
Automated recognition of facial expression is an important addition to computer vision research because of its relevance to the study of psychological phenomena and the developmen...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...
AIPS
2003
13 years 9 months ago
A Framework for Planning in Continuous-time Stochastic Domains
We propose a framework for policy generation in continuoustime stochastic domains with concurrent actions and events of uncertain duration. We make no assumptions regarding the co...
Håkan L. S. Younes, David J. Musliner, Reid ...