Sciweavers

2549 search results - page 364 / 510
» Toward a complexity theory of information systems developmen...
Sort
View
SIP
2007
13 years 9 months ago
Contactless palmprint authentication using circular gabor filter and approximated string matching
More and more research have been developed very recently for automatic hand recognition. This paper proposes a new method for contactless hand authentication in complex images. Ou...
J. Doublet, O. Lepetit, M. Revenu
EDBT
2009
ACM
135views Database» more  EDBT 2009»
14 years 23 days ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
ER
2006
Springer
98views Database» more  ER 2006»
13 years 11 months ago
Domain Analysis for Supporting Commercial Off-the-Shelf Components Selection
Though new technological trends and paradigms arise for developing complex software systems, systematic reuse continues to be an elusive goal. In this context, the adoption of Comm...
Claudia P. Ayala, Xavier Franch
CASES
2003
ACM
14 years 1 months ago
Clustered calculation of worst-case execution times
Knowing the Worst-Case Execution Time (WCET) of a program is necessary when designing and verifying real-time systems. A correct WCET analysis method must take into account the po...
Andreas Ermedahl, Friedhelm Stappert, Jakob Engblo...
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
14 years 23 days ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner