Fingerprint identification is an important biometric method for personal authentication. Rolled fingerprint can provide much more information than flat fingerprint, so the method is needed for construct a rolled finge...
详细信息
The proceedings contain 14 papers. The special focus in this conference is on Design science. The topics include: Valid knowledge for socio-technical system design;strategy formulation as a design science;a rationale ...
ISBN:
(纸本)9783319040899
The proceedings contain 14 papers. The special focus in this conference is on Design science. The topics include: Valid knowledge for socio-technical system design;strategy formulation as a design science;a rationale for the application of design-patterns within design science research to accelerate knowledge discovery and innovation adoption;activity cycles in design research;a composed artifact as innovation carrier;process for assessment data quality in complex service oriented architectures using design science approach;in-place translation in information systems development;an exploration of customer-centric cloud service design;towards a normalized systems analysis method;enhancing benefits from healthcare IT adoption using design science research and engaging practitioners within design science research.
Considering the inadequacy of deploying the SSL VPN on mobile devices, we proposed a mobile SSL VPN system which can be used on mobile devices without any complex setups. The system mainly based on port forwarding and...
详细信息
With the development of science technology, the computer networks systems has been widely used in all fields. However, threat to the security of computer networks systems has been a serious problem at present. So, thi...
详细信息
ISBN:
(纸本)9783642316555
With the development of science technology, the computer networks systems has been widely used in all fields. However, threat to the security of computer networks systems has been a serious problem at present. So, this paper research and study on the computer networks systems from two main parts-main threat to the computer networks systems and computer networks systems security detecting technology.
In many servicesystems arising in OR/MS applications, the server needs a setup time when it is turned on and the service time may be non-Markovian as usually assumed. In the present paper, we study the balking behavi...
详细信息
ISBN:
(纸本)9783642320545
In many servicesystems arising in OR/MS applications, the server needs a setup time when it is turned on and the service time may be non-Markovian as usually assumed. In the present paper, we study the balking behavior of customers in the single-server queue with two-phase Erlangian service time and setup times. Arriving customers decide whether to enter the system or balk, based on a linear reward-cost structure. We identify equilibrium threshold balking strategies under two distinct information assumptions, i.e. fully observable case and almost observable case.
With the development of computer and enterprise in formalization, enterprises depend more and more on a physical platform to realize sharing information resource and business collaboration. In order to achieve busines...
详细信息
In Web service Composition (WSC) field, service composition aims at selecting a set of existing services with different Quality of services (QoS) attributes then compositing them to accomplish a complex task to meet t...
详细信息
The method to recognize facial expression in images quickly has been widely applied in many areas, but there is no way to take into account the accuracy and speed of recognition. This paper presents a method based on ...
详细信息
The proceedings contain 33 papers. The topics discussed include: method lookup simulation with a gradual typing language;validation strategies of competences in a computerscience curriculum;selection of software deve...
ISBN:
(纸本)9781479929375
The proceedings contain 33 papers. The topics discussed include: method lookup simulation with a gradual typing language;validation strategies of competences in a computerscience curriculum;selection of software development good practices in micro and small enterprises: an approach using knowledge-based systems;a tool for modeling software development contexts in small software organizations;T2M and M2T transformations between software processes and software process models;usability heuristics validation through empirical evidences: a touchscreen-based mobile devices proposal;theoretical basis of a new method for DNA fragment assembly in k-mer graphs;use of backpropagation and differential evolution algorithms to training MLPS;improved binary decision diagram constraint propagation for satisfiability problems;AntSeg: the application of ant colony optimization to interactive image segmentation;and ARGOsearch: an information retrieval system based on text similarity and extensible relevance criteria.
From the perspective of game thesis, abilities of the company, market condition and the cost of service recovery are the main factors that the retail companies should consider when thinking their system of service rec...
详细信息
暂无评论