Sciweavers

3747 search results - page 657 / 750
» Active Operations on Collections
Sort
View
IEEECIT
2010
IEEE
13 years 6 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
ISF
2010
109views more  ISF 2010»
13 years 6 months ago
From IT deployment capabilities to competitive advantage: An exploratory study in China
As more and more companies are deploying, or plan to deploy, information systems, the organizational capabilities to effectively deploy information technologies to support and shap...
Jun Tian, Kanliang Wang, Yan Chen, Björn Joha...
PVLDB
2010
163views more  PVLDB 2010»
13 years 6 months ago
Event Processing - past, present and future
Analysts have marked Event Processing as the most growing segment in enterprise computing during years 2008 and 2009, furthermore, this trend is expected to continue. Many of the ...
Opher Etzion
SIAMIS
2010
395views more  SIAMIS 2010»
13 years 6 months ago
A Geometric Approach to Joint 2D Region-Based Segmentation and 3D Pose Estimation Using a 3D Shape Prior
Abstract. In this work, we present an approach to jointly segment a rigid object in a two-dimensional (2D) image and estimate its three-dimensional (3D) pose, using the knowledge o...
Samuel Dambreville, Romeil Sandhu, Anthony J. Yezz...
SUM
2010
Springer
13 years 6 months ago
Event Modelling and Reasoning with Uncertain Information for Distributed Sensor Networks
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Jianbing Ma, Weiru Liu, Paul Miller