Sciweavers

3394 search results - page 580 / 679
» Design patterns for semaphores
Sort
View
PR
2006
119views more  PR 2006»
13 years 10 months ago
Fingerprint matching by genetic algorithms
Fingerprint matching is still a challenging problem for reliable person authentication because of the complex distortions involved in two impressions of the same finger. In this p...
Xuejun Tan, Bir Bhanu
IJMMS
2007
142views more  IJMMS 2007»
13 years 10 months ago
Using OWL to model biological knowledge
Much has been written of the facilities for ontology building and reasoning offered for ontologies expressed in the Web Ontology Language (OWL). Less has been written about how th...
Robert Stevens, Mikel Egaña Aranguren, Katy...
JASIS
2007
101views more  JASIS 2007»
13 years 10 months ago
Mining Web functional dependencies for flexible information access
We present an approach to enhancing information access through web structure mining in contrast to traditional approaches involving usage mining. Specifically, we mine the hardwi...
Saverio Perugini, Naren Ramakrishnan
TMC
2008
164views more  TMC 2008»
13 years 10 months ago
Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks
Integrating mobile computing and localized user interaction into the Internet requires more than simply overcoming pure routing challenges. Apart from issues such as intermittent c...
Anargyros Garyfalos, Kevin C. Almeroth
JCP
2007
73views more  JCP 2007»
13 years 10 months ago
Investigating Shill Bidding Behaviour Involving Colluding Bidders
Abstract— Shill bidding is where spurious bids are introduced into an auction to drive up the final price for the seller, thereby defrauding legitimate bidders. Trevathan and Re...
Jarrod Trevathan, Wayne Read