Sciweavers

398 search results - page 67 / 80
» If INEX Is the Answer, What Is the Question
Sort
View
EFORENSICS
2009
Springer
14 years 3 months ago
Vocal Forgery in Forensic Sciences
Abstract. This article describes techniques of vocal forgery able to affect automatic speaker recognition system in a forensic context. Vocal forgery covers two main aspects: voice...
Patrick Perrot, Mathieu Morel, Joseph Razik, G&eac...
SIGUCCS
2006
ACM
14 years 2 months ago
We got the message: creating an instant messenger service point
Figuring out the best way to communicate with and serve students is one of the paramount challenges facing library and technology organizations today, including Bucknell Universit...
Jason Snyder, Meredith Field
CSCWD
2001
Springer
14 years 1 months ago
Update Algorithms for the Sketch Data Model
The authors have developed a new approach to database interoperability using the sketch data model. That technique has now been used in a number of applications, but an important ...
Michael Johnson, Robert D. Rosebrugh
ISI
2005
Springer
14 years 2 months ago
Information Supply Chain: A Unified Framework for Information-Sharing
To balance demand and supply of information, we propose a framework called “information supply chain” (ISC). This framework is based on supply chain management (SCM), which has...
Shuang Sun, John Yen
ISPW
2005
IEEE
14 years 2 months ago
Software are Processes Too
A process defines the way activities are organized, managed, measured, supported and improved to reach a goal. It has been shown, 15 years ago [1] that processes are software too; ...
Jacky Estublier