Sciweavers

769 search results - page 100 / 154
» Identifying objects in legacy systems
Sort
View
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
14 years 2 months ago
An Activity-Based Approach towards Development and Use of E-Government Service Ontologies
In order to assist bottom-up efforts by administrations annotating their Web resources with adequate metadata, we introduce and follow an activity-based approach towards developme...
Ralf Klischewski, Stefan Ukena
HICSS
2008
IEEE
104views Biometrics» more  HICSS 2008»
14 years 2 months ago
Enterprise Adoption of ICT Innovations: Multi-disciplinary Literature Analysis and Future Research Opportunities
Enterprise adoption of information and communication technology innovations has been a topic of tremendous interest to both practitioners and researchers. The influence of technol...
Rahul C. Basole
ICASSP
2008
IEEE
14 years 2 months ago
Audio cover song identification based on tonal sequence alignment
Nowadays, the term cover song (or simply cover) can mean any new version, performance, rendition, or recording of a previously recorded track. Cover song identification is a task...
Joan Serrà, Emilia Gómez
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
14 years 2 months ago
Towards a Unified Public Safety Scale
There exists an acute need for an unambiguous objectively measurable emergency scale to facilitate communication and mutual understanding of the nature of any emergency, by the pu...
Elizabeth Avery Gomez, Linda Plotnick, Eli Rohn, J...
IAT
2007
IEEE
14 years 2 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...