Sciweavers

404 search results - page 32 / 81
» An Introduction to Evaluating Biometric Systems
Sort
View
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 3 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele
CLEAR
2007
Springer
121views Biometrics» more  CLEAR 2007»
14 years 2 months ago
Progress in the AMIDA Speaker Diarization System for Meeting Data
In this paper we describe the AMIDA speaker dizarization system as it was submitted to the NIST Rich Transcription evaluation 2007 for conference room data. This is done in the con...
David A. van Leeuwen, Matej Konecný
HICSS
2005
IEEE
146views Biometrics» more  HICSS 2005»
14 years 2 months ago
Maintaining Continuous Dependability in Sensor-Based Context-Aware Pervasive Computing Systems
Sensors are often indicative of events of interest, or events which a system should be aware of and should react to. In particular, such indications may reflect unsteadiness or in...
Amir Padovitz, Arkady B. Zaslavsky, Seng Wai Loke,...
HICSS
2008
IEEE
89views Biometrics» more  HICSS 2008»
14 years 3 months ago
Reference Models and Modeling Languages for Product-Service Systems - Status-Quo and Perspectives for Further Research
Being confronted with decreasing margins and a rising customer demand for integrated solutions, manufacturing companies integrate complementary services into their portfolio. Offe...
Jörg Becker, Daniel Beverungen, Ralf Knackste...
HICSS
2010
IEEE
203views Biometrics» more  HICSS 2010»
14 years 3 months ago
Secure Planning of Order Picking Systems with the Aid of Simulation
Planning a new logistics center is a quite difficult job. Depending on the requirements there are a great number of possible design versions. The planner has to consider not only ...
Alexander Ulbrich, Stefan Galka, Willibald A. G&uu...