Sciweavers

1407 search results - page 254 / 282
» Systems Theory Model for Information Security
Sort
View
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
14 years 4 months ago
Reexamining Threat Rigidity: Implications for Design
Emergencies today seem larger, more complex, and unique than those of the past. Responding to them requires flexibility and creativity not easily achieved. The threat-rigidity the...
Linda Plotnick, Murray Turoff, Gerd Van Den Eede
3DPVT
2006
IEEE
145views Visualization» more  3DPVT 2006»
14 years 3 months ago
The Recursive Multi-Frame Planar Parallax Algorithm
This paper presents a method for obtaining accurate dense elevation and appearance models of terrain using a single camera on-board an aerial platform. Applications of this method...
Christopher Geyer, Todd Templeton, Marci Meingast,...
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 2 months ago
The Mobile Internet: The Pioneering Users' Adoption Decisions
Substantial financial and technological investments by private and public organizations have resulted in the delivery of the third generation mobile technologies, although the jou...
Ann Fogelgren-Pedersen
MM
2003
ACM
124views Multimedia» more  MM 2003»
14 years 2 months ago
Using structure patterns of temporal and spectral feature in audio similarity measure
Although statistical characteristics of audio features are widely used for similarity measure in most of current audio analysis systems and have been proved to be effective, they ...
Rui Cai, Lie Lu, HongJiang Zhang
ALIFE
2006
13 years 9 months ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho