Showing 1 - 10 of 61
The authors have developed a novel methodology for utilising open standards for the reporting and correction of IFC … employs the open standard BIM Collaboration Format (BCF) in the communication and correction of issues to resolve to match the …
Persistent link: https://www.econbiz.de/10012042523
Most of matching or verification phases of fingerprint systems use minutiae types and orientation angle to find matched …. The authors are then interested in a fingerprint matching method using contactless images for fingerprint verification … fingerprint images. The verification accuracy is found to be acceptable and the experimental results are promising. …
Persistent link: https://www.econbiz.de/10012043812
Health professionals need an access to various dimensions of Electronic Health Records (EHR). Depending on technical constraints, each organization defines its own access control schema exhibiting heterogeneity in organizational rules and policies. Achieving interoperability between such schemas...
Persistent link: https://www.econbiz.de/10012044418
-UML suffers from lack of formal semantics due to its semi-formal nature which penalize the verification of correct behavior of the … modeled systems. This paper provides a graphical yet formal approach for the modeling, simulation and verification of mobile … either execu-tion through simulation by flowgraphs or verification through model checking, using existing tools (e.g. the …
Persistent link: https://www.econbiz.de/10012045494
Hierarchical WF-nets (HWN) in order to formally check the “soundness” property on IOWF process models. For that, their verification …) transformation from BPEL to WF-nets (resp. HWN) models using mapping and transformation rules and (iii) verification of the … their verification method, the authors developed a “WF-Checking” tool which allows the implementation and testing of the …
Persistent link: https://www.econbiz.de/10012045663
threshold. The challenge is that the design of proofs and verification objects has to be customized for different data mining … algorithms. Intended method will implement a basic idea of completeness verification and authentication approach in which the …
Persistent link: https://www.econbiz.de/10012047567
Massive Open Online Courses (MOOCs) are commonly hosted as web servers for learners worldwide to access education and learning materials at low cost. Many of the well-known MOOCs have adopted open source software and database technologies and frequently operate within cloud environments. It is...
Persistent link: https://www.econbiz.de/10012048077
weakness, this study evaluated the usability and viability of alternative ballot verification methods in an electronic voting … medium. Three verification methods were tested: end-of-ballot, in-line confirmation, and dual confirmation. In-line and dual …
Persistent link: https://www.econbiz.de/10012048464
When and how do entrepreneurs sell their inventions? To address this issue, we develop an endogenous entry-sale asymmetric information oligopoly model. We show that lowquality inventions are sold directly or used for own entry. Inventors who sell post-entry use entry to credibly reveal...
Persistent link: https://www.econbiz.de/10011917062
Ontology evaluation is the task of measuring the quality of an ontology. It enables us to answer the following main question: How to assess the quality of an ontology for the Web? In this thesis a theoretical framework and several methods breathing life into the framework are presented. The...
Persistent link: https://www.econbiz.de/10009434551