Sciweavers

1407 search results - page 219 / 282
» Systems Theory Model for Information Security
Sort
View
TIFS
2008
129views more  TIFS 2008»
13 years 9 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
ECIS
2004
13 years 10 months ago
Beyond Knowledge Management - Introducing a framework for Learning Management Systems
In the knowledge economy, a firm's intellectual capital represents the only sustainable source of competitive advantage. Intellectual capital manifests itself, predominantly,...
Audrey Dunne, Tom Butler
TPHOL
2007
IEEE
14 years 3 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao
SAC
2004
ACM
14 years 2 months ago
A decision-theoretic approach for designing proactive communication in multi-agent teamwork
Techniques that support effective communication during teamwork processes are of particular importance. Psychological study shows that an effective team often can anticipate infor...
Yu Zhang, Richard A. Volz, Thomas R. Ioerger, John...
CIKM
2009
Springer
14 years 3 months ago
Using opinion-based features to boost sentence retrieval
Opinion mining has become recently a major research topic. A wide range of techniques have been proposed to enable opinion-oriented information seeking systems. However, little is...
Ronald T. Fernández, David E. Losada