Sciweavers

475 search results - page 58 / 95
» On Some Performance Indices for Biometric Identification Sys...
Sort
View
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
14 years 1 months ago
Pervasive Real-Time IT as a Disruptive Technology for the IS Field
This paper builds on ideas in a recent paper which argued that the core subject matter of the IS field should not be “the IT artifact” (as suggested by Orlikowski and Iacono [...
Steven Alter
SMC
2007
IEEE
113views Control Systems» more  SMC 2007»
14 years 2 months ago
Evaluation and implement of fuzzy vault scheme using indexed minutiae
— Juels et. al proposed a fuzzy vault scheme that extracts secret from inexact biometric information. However, typical feature extracted from fingerprint, called minutiae, is as...
Hiroaki Kikuchi, Yasunori Onuki, Kei Nagai
EDM
2010
163views Data Mining» more  EDM 2010»
13 years 9 months ago
Can Order of Access to Learning Resources Predict Success?
Learning management systems capture student's interactions with the course contents in the form of event logs, including the order in which resources are accessed. We build on...
Hema Soundranayagam, Kalina Yacef
HICSS
2008
IEEE
192views Biometrics» more  HICSS 2008»
14 years 2 months ago
Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case Study
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
Koen Kok, Zsófia Derzsi, Jaap Gordijn, Maar...
HICSS
2005
IEEE
157views Biometrics» more  HICSS 2005»
14 years 1 months ago
A Two-Stage Heuristic for the Vehicle Routing Problem with Time Windows and a Limited Number of Vehicles
The Vehicle Routing Problem with Time Windows (VRPTW) is an important problem in logistics. The problem is to serve a number of customers at minimum cost without violating the cus...
Andrew Lim, Xingwen Zhang