Sciweavers

50 search results - page 7 / 10
» Evaluation of Biometric Identification in Open Systems
Sort
View
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 1 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele
HICSS
2005
IEEE
125views Biometrics» more  HICSS 2005»
14 years 20 days ago
Taking Topic Detection From Evaluation to Practice
Abstract— The Topic Detection and Tracking (TDT) research community investigates information retrieval methods for organizing a constantly arriving stream of news articles by the...
James Allan, Stephen M. Harding, David Fisher, Alv...
ICMI
2010
Springer
196views Biometrics» more  ICMI 2010»
13 years 5 months ago
Component-based high fidelity interactive prototyping of post-WIMP interactions
In order to support interactive high-fidelity prototyping of postWIMP user interactions, we propose a multi-fidelity design method based on a unifying component-based model and su...
Jean-Yves Lionel Lawson, Mathieu Coterot, Cyril Ca...
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
13 years 7 months ago
Superstate identification for state machines using search-based clustering
State machines are a popular method of representing a syshigh level of abstraction that enables developers to gain an overview of the system they represent and quickly understand ...
Mathew Hall, Phil McMinn, Neil Walkinshaw
ECOOP
2005
Springer
14 years 17 days ago
Attached Types and Their Application to Three Open Problems of Object-Oriented Programming
The three problems of the title — the first two widely discussed in the literature, the third less well known but just as important for further development of object technology ...
Bertrand Meyer