Sciweavers

466 search results - page 83 / 94
» Biometric Identification System Based on Electrocardiogram D...
Sort
View
SRDS
2010
IEEE
13 years 6 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
IJCNLP
2005
Springer
14 years 2 months ago
A Lexicon-Constrained Character Model for Chinese Morphological Analysis
Abstract. This paper proposes a lexicon-constrained character model that combines both word and character features to solve complicated issues in Chinese morphological analysis. A ...
Yao Meng, Hao Yu, Fumihito Nishino
HICSS
2002
IEEE
127views Biometrics» more  HICSS 2002»
14 years 1 months ago
Weaving Community with Community Fibre: Community Informatics and the Broadband Revolution
Unexpectedly, the widespread availability of very very high speed (Broadband) bandwidth into communities and within large centres has become not only a long-term possibility but a...
Michael Gurstein
HICSS
2003
IEEE
62views Biometrics» more  HICSS 2003»
14 years 1 months ago
A Study on the Impacts of Verbal Interaction in Proximate GSS Sessions
Although distributed Group Support Systems (GSS) are getting popular, there are still some limitations. One of the limitations is few substitutions for face-to-face (FTF) interact...
Tsuneki Mukahi, Gail Corbitt
KYOTODL
2000
122views more  KYOTODL 2000»
13 years 10 months ago
Federation Services for Heterogeneous Digital Libraries Accessing Cooperative and Non-Cooperative Sources
Today, bibliographical information is kept in a variety of digital libraries available on the Internet. The integration of bibliographical data is considered as one of the most im...
Martin Endig, Michael Höding, Gunter Saake, K...