Sciweavers

3193 search results - page 620 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
DIMEA
2008
164views Multimedia» more  DIMEA 2008»
13 years 9 months ago
Lessons learned: game design for large public displays
This paper presents the design and deployment of Polar Defence, an interactive game for a large public display. We designed this display based on a model of "users" and ...
Matthias Finke, Anthony Tang, Rock Leung, Michael ...
DIWEB
2001
13 years 9 months ago
Converting XML Data To UML Diagrams For Conceptual Data Integration
The demand for data integration is rapidly becoming larger as more and more information sources appear in modern enterprises. In many situations a logical (rather than physical) i...
Mikael R. Jensen, Thomas H. Møller, Torben ...
ESANN
2001
13 years 9 months ago
Applications of neuro-fuzzy classification, evaluation and forecasting techniques in agriculture
Aim of the present article is to show the results obtained from the application of neuro-fuzzy methodology in the solution of agriculture problems like the Bactrocera Oleae (olive...
Elena Bellei, Diego Guidotti, Ruggero Petacchi, Le...
AAAI
1990
13 years 8 months ago
Generalized Shape Autocorrelation
This paper presents an efficient and homogeneous paradigm for automatic acquisition and recognition of nonparametric shapes. Acquisition time varies from linear to cubic in the nu...
Andrea Califano, Rakesh Mohan
ICASSP
2010
IEEE
13 years 7 months ago
Speaker identification with distant microphone speech
The field of speaker identification has recently seen significant advancement, but improvements have tended to be benchmarked on near-field speech, ignoring the more realistic set...
Qin Jin, Runxin Li, Qian Yang, Kornel Laskowski, T...