Sciweavers

7351 search results - page 1416 / 1471
» Segmenting Point Sets
Sort
View
KDD
2004
ACM
116views Data Mining» more  KDD 2004»
14 years 1 months ago
A system for automated mapping of bill-of-materials part numbers
Part numbers are widely used within an enterprise throughout the manufacturing process. The point of entry of such part numbers into this process is normally via a Bill of Materia...
Jayant Kalagnanam, Moninder Singh, Sudhir Verma, M...
MABS
2004
Springer
14 years 1 months ago
Formal Analysis of Meeting Protocols
Organizations depend on regular meetings to carry out their everyday tasks. When carried out successfully, meetings offer a common medium for participants to exchange ideas and mak...
Catholijn M. Jonker, Martijn C. Schut, Jan Treur, ...
PROFES
2004
Springer
14 years 1 months ago
Using a Reference Application with Design Patterns to Produce Industrial Software
Abstract. System architectures are described in abstract terms, often using Design Patterns. Actual reuse based on such descriptions requires that each development project derive a...
Marek Vokác, Oluf Jensen
VLDB
2004
ACM
187views Database» more  VLDB 2004»
14 years 1 months ago
Voronoi-Based K Nearest Neighbor Search for Spatial Network Databases
A frequent type of query in spatial networks (e.g., road networks) is to find the K nearest neighbors (KNN) of a given query object. With these networks, the distances between ob...
Mohammad R. Kolahdouzan, Cyrus Shahabi
CHI
2010
ACM
14 years 29 days ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
« Prev « First page 1416 / 1471 Last » Next »