Sciweavers

6660 search results - page 1271 / 1332
» Data Analysis for Query Processing
Sort
View
JMM2
2006
149views more  JMM2 2006»
13 years 10 months ago
Invariant Robust 3-D Face Recognition based on the Hilbert Transform in Spectral Space
One of the main objectives of face recognition is to determine whether an acquired face belongs to a reference database and to subsequently identify the corresponding individual. F...
Eric Paquet, Marc Rioux
JSAC
2006
163views more  JSAC 2006»
13 years 10 months ago
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packets....
Sarang Dharmapurikar, John W. Lockwood
TIFS
2008
145views more  TIFS 2008»
13 years 10 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
IWC
2007
92views more  IWC 2007»
13 years 10 months ago
Consumers, channels and communication: Online and offline communication in service consumption
This paper reports on a study that investigated consumer use of e-services in a multichannel context. To develop a deeper understanding of what makes consumers decide to use the o...
Geke van Dijk, Shailey Minocha, Angus Laing
AIEDU
2004
105views more  AIEDU 2004»
13 years 10 months ago
Evaluating the REDEEM Authoring Tool: Can Teachers Create Effective Learning Environments?
The REDEEM authoring environment allows teachers to create learning environments from existing computer-based training (CBT) by imposing their pedagogical preferences about how stu...
Shaaron Ainsworth, Shirley Grimshaw
« Prev « First page 1271 / 1332 Last » Next »