Sciweavers

4486 search results - page 116 / 898
» Cross-Evaluation: A new model for information system evaluat...
Sort
View
CDC
2009
IEEE
136views Control Systems» more  CDC 2009»
14 years 26 days ago
A probabilistic approach to air traffic complexity evaluation
Assessing air traffic complexity on a mid term horizon can help to timely identify those safety-critical encounter situations that would require many tactical resolution maneuvers ...
Maria Prandini, Jianghai Hu
ICASSP
2010
IEEE
13 years 6 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
DGO
2003
140views Education» more  DGO 2003»
13 years 10 months ago
Social Welfare Program Administration and Evaluation and Policy Analysis Using Knowledge Discovery and Data Mining (KDD) on Admi
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...
USENIX
2007
13 years 11 months ago
Implementation and Performance Evaluation of Fuzzy File Block Matching
The fuzzy file block matching technique (fuzzy matching for short), was first proposed for opportunistic use of Content Addressable Storage. Fuzzy matching aims to increase the ...
Bo Han, Peter J. Keleher
ASWC
2006
Springer
13 years 10 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...