Sciweavers

1454 search results - page 149 / 291
» Modeling User Affect from Causes and Effects
Sort
View
ICASSP
2011
IEEE
14 years 7 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
P2P
2008
IEEE
149views Communications» more  P2P 2008»
15 years 10 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright
BPM
2006
Springer
135views Business» more  BPM 2006»
15 years 7 months ago
Managing Process Variants as an Information Resource
Many business solutions provide best practice process templates, both generic as well as for specific industry sectors. However, it is often the variance from template solutions th...
Ruopeng Lu, Shazia Wasim Sadiq
AUSAI
2006
Springer
15 years 7 months ago
Incorporating Pageview Weight into an Association-Rule-Based Web Recommendation System
Web recommendation systems based on web usage mining try to mine users' behavior patterns from web access logs, and recommend pages to the online user by matching the user...
Liang Yan, Chunping Li
TSE
2008
165views more  TSE 2008»
15 years 3 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han