Sciweavers

592 search results - page 115 / 119
» Towards Co-Design of Business Processes and Information Syst...
Sort
View
DRM
2007
Springer
14 years 1 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
CHI
2003
ACM
14 years 27 days ago
Breakingstory: visualizing change in online news
BreakingStory is an interactive system for visualizing change in online news. The system regularly collects the text from the front pages of international daily news web sites. It...
Jean Anne Fitzpatrick, James Reffell, Moryma Aydel...
MDM
2009
Springer
269views Communications» more  MDM 2009»
14 years 2 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
ACSAC
2009
IEEE
14 years 2 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
ESWS
2008
Springer
13 years 9 months ago
Semantic Reasoning: A Path to New Possibilities of Personalization
Abstract. Recommender systems face up to current information overload by selecting automatically items that match the personal preferences of each user. The so-called content-based...
Yolanda Blanco-Fernández, José J. Pa...