Sciweavers

1407 search results - page 226 / 282
» Systems Theory Model for Information Security
Sort
View
HICSS
2003
IEEE
117views Biometrics» more  HICSS 2003»
14 years 2 months ago
The German Mobile Standards Battle
The diffusion of innovations has long been a research domain in IS research. Yet, there is no sound theory nor practice to fully understand the complex mechanisms behind networks ...
Roman Beck, Daniel Beimborn, Tim Weitzel
HICSS
2006
IEEE
108views Biometrics» more  HICSS 2006»
14 years 3 months ago
Matching People and Jobs: A Bilateral Recommendation Approach
Recommendation systems are widely used on the Internet to assist customers in finding the products or services that best fit with their individual preferences. While current imple...
Jochen Malinowski, Tobias Keim, Oliver Wendt, Tim ...
ICPR
2006
IEEE
14 years 10 months ago
Real Time Tracking for 3D Realistic Lip Animation
This article deals with facial segmentation and liptracking with feedback control for real-time animation of a synthetic 3D face model. Classical approaches consist in two success...
Brice Beaumesnil, Franck Luthon
WSDM
2010
ACM
215views Data Mining» more  WSDM 2010»
14 years 6 months ago
Boilerplate Detection using Shallow Text Features
In addition to the actual content Web pages consist of navigational elements, templates, and advertisements. This boilerplate text typically is not related to the main content, ma...
Christian Kohlschütter, Peter Fankhauser, Wol...
IRI
2005
IEEE
14 years 2 months ago
Data integration for capital projects via community-specific conceptual representations
Although data integration has been a research subject for decades in the AEC (Architecture Engineering Construction) industry whose data is usually highly fragmented, nowadays we ...
Yimin Zhu, Mei-Ling Shyu, Shu-Ching Chen