Sciweavers

404 search results - page 71 / 81
» An Introduction to Evaluating Biometric Systems
Sort
View
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
14 years 2 months ago
Towards Verifying Parametrised Hardware Libraries with Relative Placement Information
Abstract— This paper presents a framework for verifying compilation tools for parametrised hardware libraries with placement information. Such libraries are captured in Pebble, a...
Steve McKeever, Wayne Luk, Arran Derbyshire
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
14 years 2 months ago
Expanding Citizen Access and Public Official Accountability through Knowledge Creation Technology: One Recent Development in e-D
The authors describe an addition to the conversation regarding enhanced democracy through technologicallyassisted means (e-Democracy) focusing on enhancing and expanding the typic...
Michael A. Shires, Murray S. Craig
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 10 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
HICSS
2011
IEEE
264views Biometrics» more  HICSS 2011»
13 years 14 days ago
The Kukui Cup: A Dorm Energy Competition Focused on Sustainable Behavior Change and Energy Literacy
Abstract—The Kukui Cup is an advanced dorm energy competition whose goal is to investigate the relationships among energy literacy, sustained energy conservation, and information...
Robert S. Brewer, George E. Lee, Philip M. Johnson
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
14 years 3 months ago
Supporting Knowledge Transfer through Decomposable Reasoning Artifacts
Technology to support knowledge transfer and cooperative inquiry must offer its users the ability to effectively interpret knowledge structures produced by collaborators. Communic...
William Pike, Richard May, Alan Turner