Sciweavers

14386 search results - page 2768 / 2878
» Algorithms for user interfaces
Sort
View
HICSS
2011
IEEE
183views Biometrics» more  HICSS 2011»
14 years 6 months ago
Optimizing Access across Multiple Hierarchies in Data Warehouses
In enterprise data warehouses, different users in different business units often define their own application specific dimension hierarchies tailor made to their reporting and b...
Lipyeow Lim, Bishwaranjan Bhattacharjee
131
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
157
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Interference alignment in single-beam MIMO networks via homotopy continuation
In this paper we consider the application of a homotopy-continuation based method for finding interference alignment (IA) solutions for the deterministic K-user multiple-input mu...
Oscar Gonzalez, Ignacio Santamaría
ICASSP
2011
IEEE
14 years 6 months ago
An unconstrained method for lip detection in color images
The use of visual information derived from accurate lip extraction, can provide features invariant to noise perturbation for speech recognition systems and can be also used in a w...
Evangelos Skodras, Nikolaos D. Fakotakis
178
Voted
HT
2011
ACM
14 years 6 months ago
Automatic mining of cognitive metadata using fuzzy inference
Personalized search and browsing is increasingly vital especially for enterprises to able to reach their customers. Key challenge in supporting personalization is the need for ric...
Melike Sah, Vincent Wade
« Prev « First page 2768 / 2878 Last » Next »