Sciweavers

2950 search results - page 441 / 590
» Computing with Infinitely Many Processes
Sort
View
113
Voted
3DIM
2005
IEEE
15 years 8 months ago
3D Registration by Textured Spin-Images
This work is motivated by the desire of exploiting for 3D registration purposes the photometric information current range cameras typically associate to range data. Automatic pair...
Nicola Brusco, Marco Andreetto, Andrea Giorgi, Gui...
129
Voted
3DIM
2005
IEEE
15 years 8 months ago
Determining Characteristic Views of a 3D Object by Visual Hulls and Hausdorff Distance
Nowadays, with the exponential growing of 3D object representations in private databases or on the web, it is all the more required to match these objects from some views. To impr...
Adrien Theetten, Jean-Philippe Vandeborre, Mohamed...
97
Voted
EDOC
2005
IEEE
15 years 8 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
EEE
2005
IEEE
15 years 8 months ago
Predicting the Survival or Failure of Click-and-Mortar Corporations
With the boom in e-business, several corporations have emerged in the late nineties that have primarily conducted their business through the Internet and the Web. They have come t...
Indranil Bose, Raktim Pal
137
Voted
HICSS
2005
IEEE
164views Biometrics» more  HICSS 2005»
15 years 8 months ago
An Efficient Technique for Frequent Pattern Mining in Real-Time Business Applications
Association rule mining in real-time is of increasing thrust in many business applications. Applications such as e-commerce, recommender systems, supply-chain management and group...
Rajanish Dass, Ambuj Mahanti