Sciweavers

1096 search results - page 107 / 220
» Software Architecture Analysis of Usability
Sort
View
CCR
2011
13 years 3 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
MOBILITY
2009
ACM
14 years 3 months ago
Mobile visual access to legacy voice-based applications
Vocal systems are a well-established reality. Examples of popular voice-based applications include helpdesk services, reservation systems, and vocal mailboxes. These services, tha...
Marco Avvenuti, Alessio Vecchio
DRM
2007
Springer
14 years 3 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
SEFM
2005
IEEE
14 years 2 months ago
Formalising Control in Robust Spoken Dialogue Systems
The spoken language interface is now becoming an increasingly serious research topic with application to a wide range of highly engineered systems. Such systems not only include i...
Hui Shi, Robert J. Ross, John A. Bateman
EDBTW
2006
Springer
14 years 17 days ago
Towards Similarity-Based Topological Query Languages
Abstract. In recent times, the proliferation of spatial data on the Internet is beginning to allow a much larger audience to access and share data currently available in various Ge...
Alberto Belussi, Omar Boucelma, Barbara Catania, Y...