Sciweavers

1282 search results - page 23 / 257
» A cost-benefit evaluation method for web-based information s...
Sort
View
CIKM
2010
Springer
13 years 6 months ago
Detecting product review spammers using rating behaviors
This paper aims to detect users generating spam reviews or review spammers. We identify several characteristic behaviors of review spammers and model these behaviors so as to dete...
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Li...
ICISS
2009
Springer
13 years 5 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
CAISE
2008
Springer
13 years 9 months ago
On Modeling and Analyzing Cost Factors in Information Systems Engineering
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs....
Bela Mutschler, Manfred Reichert
INEX
2004
Springer
14 years 27 days ago
Using a Relevance Propagation Method for Adhoc and Heterogeneous Tracks at INEX 2004
This paper describes the evaluation of the XFIRM system in INEX 2004 framework. The XFIRM system uses a relevance propagation method to answer queries composed of content condition...
Karen Sauvagnat, Mohand Boughanem
MVA
2007
281views Computer Vision» more  MVA 2007»
13 years 9 months ago
Evaluation of Stereo Matching Systems for Real World Applications Using Structured Light for Ground Truth Estimation
In this paper we present an evaluation method for stereo matching systems and sensors especially for real world indoor applications. We estimate ground truth reference images by i...
Martin Humenberger, Daniel Hartermann, Wilfried Ku...