Sciweavers

1466 search results - page 132 / 294
» Completeness of the Authentication Tests
Sort
View
GAMEON
2009
13 years 5 months ago
Psychologically Verified Player Modelling
This research attempts to measure personality by monitoring behaviour in a virtual environment. A computer game was created to measure a trait of the Five Factor Model of personal...
Giel van Lankveld, Sonny Schreurs, Pieter Spronck
JORS
2010
134views more  JORS 2010»
13 years 2 months ago
An overview and framework for PD backtesting and benchmarking
In order to manage model risk, financial institutions need to set up validation processes so as to monitor the quality of the models on an ongoing basis. Validation can be conside...
G. Castermans, David Martens, Tony Van Gestel, B. ...
MST
2011
231views Hardware» more  MST 2011»
12 years 11 months ago
On the Complexity of Matroid Isomorphism Problem
We study the complexity of testing if two given matroids are isomorphic. The problem is easily seen to be in Σ p 2. In the case of linear matroids, which are represented over pol...
B. V. Raghavendra Rao, Jayalal M. N. Sarma
ACSAC
2005
IEEE
14 years 1 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
IQ
2007
13 years 9 months ago
Assessing Information Quality In A RFID-Integrated Shelf Replenishment Decision Support System For The Retail Industry
: Motivated by the problem of out-of-shelf (OOS) in retail industry and the emergence of RFID (Radio Frequency Identification) technology, this paper investigates the impact that t...
Cleopatra Bardaki, Katerina Pramatari