Sciweavers

319 search results - page 41 / 64
» Combining Multiple Weak Clusterings
Sort
View
PERVASIVE
2010
Springer
13 years 11 months ago
Using Height Sensors for Biometric Identification in Multi-resident Homes
Abstract. In this study, we evaluate the use of height for biometric identification of residents, by mounting ultrasonic distance sensors above the doorways in a home. Height senso...
Vijay Srinivasan, John A. Stankovic, Kamin Whiteho...
IJMMS
2007
103views more  IJMMS 2007»
13 years 9 months ago
Improving password security and memorability to protect personal and organizational information
Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method f...
Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bha...
SPE
2008
108views more  SPE 2008»
13 years 9 months ago
Effective asymmetric XML compression
The innate verbosity of the Extensible Markup Language remains one of its main weaknesses, especially when large XML documents are concerned. This problem can be solved with the a...
Przemyslaw Skibinski, Szymon Grabowski, Jakub Swac...
JTAER
2007
90views more  JTAER 2007»
13 years 8 months ago
One-size e-business adoption model does not fit all
This empirical study of organisational e-business adoption, utilising both qualitative and quantitative data collection methods, examines four major factors influencing adoption i...
Barbara Roberts, Mark Toleman
JVCIR
2010
180views more  JVCIR 2010»
13 years 7 months ago
Geometric attraction-driven flow for image segmentation and boundary detection
Noble forces in image segmentation based on active contours models are proposed for capturing objects in the image. Contemplating the common functionality of forces in previous ac...
Jooyoung Hahn, Chang-Ock Lee