Sciweavers

605 search results - page 72 / 121
» A strategy for efficiently verifying requirements
Sort
View
ICB
2007
Springer
205views Biometrics» more  ICB 2007»
14 years 3 months ago
Embedded Palmprint Recognition System on Mobile Devices
There are increasing requirements for mobile personal identification, e.g. to protect identity theft in wireless applications. Based on built-in cameras of mobile devices, palmprin...
Yufei Han, Tieniu Tan, Zhenan Sun, Ying Hao
VLDB
2004
ACM
125views Database» more  VLDB 2004»
14 years 2 months ago
Reverse kNN Search in Arbitrary Dimensionality
Given a point q, a reverse k nearest neighbor (RkNN) query retrieves all the data points that have q as one of their k nearest neighbors. Existing methods for processing such quer...
Yufei Tao, Dimitris Papadias, Xiang Lian
IPPS
2003
IEEE
14 years 2 months ago
Effective Utilization and Reconfiguration of Distributed Hardware Resources Using Job Management Systems
Reconfigurable hardware resources are very expensive, and yet can be underutilized. This paper describes a middleware capable of discovering underutilized computing nodes with FPG...
Kris Gaj, Tarek A. El-Ghazawi, Nikitas A. Alexandr...
NDSS
2002
IEEE
14 years 2 months ago
PAMINA: A Certificate Based Privilege Management System
In this paper we present PAMINA (Privilege Administration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distr...
Zoltán Nochta, Peter Ebinger, Sebastian Abe...
ICCS
1998
Springer
14 years 1 months ago
Handling Specification Knowledge Evolution Using Context Lattices
Internet-based information technologies have considerable potential for improving collaboration in professional communities. In this paper, we explain the concept of user-driven sp...
Aldo de Moor, Guy W. Mineau