Sciweavers

345 search results - page 32 / 69
» When Systems Loose their Identity
Sort
View
ACISICIS
2005
IEEE
13 years 12 months ago
Palmprint Identification Algorithm Using Hu Invariant Moments and Otsu Binarization
Recently, Biometrics-based personal identification is regarded as an effective method of person's identity with recognition automation and high performance. In this paper, th...
Jin Soo Noh, Kang Hyeon Rhee
FORTE
2007
13 years 11 months ago
Coordination Via Types in an Event-Based Framework
We propose a novel approach to service choreography through a typed process calculus that features an event notification paradigm for coordinating distributed components (e.g., se...
GianLuigi Ferrari, Roberto Guanciale, Daniele Stro...
ATAL
2010
Springer
13 years 11 months ago
Combining statistics and arguments to compute trust
We propose a method for constructing Dempster-Shafer belief functions modeling the trust of a given agent (the evaluator) in another (the target) by combining statistical informat...
Paul-Amaury Matt, Maxime Morge, Francesca Toni
ANSS
2007
IEEE
14 years 4 months ago
Evaluating the Design of Biological Cells Using a Computer Workbench
For embedded systems as well as for biological cell systems, design is a feature that defines their identity. The assembly of different components in designs of both systems can ...
Tessa E. Pronk, Simon Polstra, Andy D. Pimentel, T...
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
14 years 3 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic