Sciweavers

792 search results - page 145 / 159
» Knowledge Engineering: Principles and Methods
Sort
View
DRM
2007
Springer
14 years 2 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
QOSA
2007
Springer
14 years 1 months ago
Factors Influencing Industrial Practices of Software Architecture Evaluation: An Empirical Investigation
To support software architecture evaluation practices, several efforts have been made to provide a basis for comparing and assessing evaluation methods, document various best pract...
Muhammad Ali Babar, Len Bass, Ian Gorton
ISESE
2005
IEEE
14 years 1 months ago
Integrating agile software development and software process improvement: a longitudinal case study
Agile software development solutions are targeted at enhancing work at project level. Little is yet known about the relationship between agile projects and organizational capabili...
Outi Salo, Pekka Abrahamsson
SIGCSE
2005
ACM
179views Education» more  SIGCSE 2005»
14 years 1 months ago
Design patterns for database pedagogy: a proposal
Courses in Relational Databases largely use a domain-specific design approach different from that used in the rest of the curriculum. Use of the Unified Process, UML, and Design P...
Thomas J. Marlowe, Cyril S. Ku, James W. Benham
AIRWEB
2005
Springer
14 years 1 months ago
Blocking Blog Spam with Language Model Disagreement
We present an approach for detecting link spam common in blog comments by comparing the language models used in the blog post, the comment, and pages linked by the comments. In co...
Gilad Mishne, David Carmel, Ronny Lempel