Sciweavers

485 search results - page 43 / 97
» On the Individuality of the Iris Biometric
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 3 months ago
The Commit Size Distribution of Open Source Software
With the growing economic importance of open source, we need to improve our understanding of how open source software development processes work. The analysis of code contribution...
Oliver Arafat, Dirk Riehle
HICSS
2009
IEEE
196views Biometrics» more  HICSS 2009»
14 years 3 months ago
Monetizing the Internet: Surely There Must be Something other than Advertising
Almost all attempts to monetize internet applications targeted at individuals to date have focused on natural extensions of traditional media or traditional retailing. Most are ei...
Eric K. Clemons
ICB
2009
Springer
188views Biometrics» more  ICB 2009»
14 years 3 months ago
Pixelwise Local Binary Pattern Models of Faces Using Kernel Density Estimation
Local Binary Pattern (LBP) histograms have attained much attention in face image analysis. They have been successfully used in face detection, recognition, verification, facial ex...
Timo Ahonen, Matti Pietikäinen
HICSS
2008
IEEE
81views Biometrics» more  HICSS 2008»
14 years 3 months ago
An Exploratory Framework for Future E-Government Research Investments
After more than a decade of e-government research, little work has been done to envision the longer term future of government and society and the unanswered questions associated w...
Sharon S. Dawes
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 3 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani