Sciweavers

266 search results - page 38 / 54
» Computer Based Assessment Systems Evaluation via the ISO9126...
Sort
View
MIR
2006
ACM
178views Multimedia» more  MIR 2006»
14 years 1 months ago
Dual diffusion model of spreading activation for content-based image retrieval
This paper introduces a content-based information retrieval method inspired by the ideas of spreading activation models. In response to a given query, the proposed approach comput...
Serhiy Kosinov, Stéphane Marchand-Maillet, ...
IMC
2004
ACM
14 years 1 months ago
Availability, usage, and deployment characteristics of the domain name system
The Domain Name System (DNS) is a critical part of the Internet’s infrastructure, and is one of the few examples of a robust, highlyscalable, and operational distributed system....
Jeffrey Pang, James Hendricks, Aditya Akella, Robe...
CCS
2004
ACM
14 years 1 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
COLING
2010
13 years 2 months ago
Contextual Recommendation based on Text Mining
The potential benefit of integrating contextual information for recommendation has received much research attention recently, especially with the ever-increasing interest in mobil...
Yize Li, Jiazhong Nie, Yi Zhang, Bingqing Wang, Ba...
SIGGRAPH
1993
ACM
13 years 11 months ago
Radioptimization: goal based rendering
This paper presents a method for designing the illumination in an environment using optimization techniques applied to a radiosity based image synthesis system. An optimization of...
John K. Kawai, James S. Painter, Michael F. Cohen