Sciweavers

9105 search results - page 83 / 1821
» Design of the MUC-6 evaluation
Sort
View
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
12 years 11 months ago
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues...
Kresimir Kasal, Johannes Heurix, Thomas Neubauer
ASIACRYPT
2005
Springer
14 years 1 months ago
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
We propose Gate Evaluation Secret Sharing (GESS) – a new kind of secret sharing, designed for use in secure function evaluation (SFE) with minimal interaction. The resulting simp...
Vladimir Kolesnikov
SAC
2003
ACM
14 years 1 months ago
Evaluating the Usability of Portable Electronic Books
This paper outlines the methodology and results of the EBONI Project’s evaluation of portable electronic books, in which staff from UK academia were provided with a selection of...
Ruth Wilson, Monica Landoni
UM
2001
Springer
14 years 12 days ago
Evaluation of Adaptive Systems
Unambiguously, adaptive systems have to be evaluated empirically to guarantee that the adaptivity really works. Nevertheless, only few of the existing adaptive systems have been ev...
Stephan Weibelzahl
COLING
2010
13 years 3 months ago
Evaluation of Dependency Parsers on Unbounded Dependencies
We evaluate two dependency parsers, MSTParser and MaltParser, with respect to their capacity to recover unbounded dependencies in English, a type of evaluation that has been appli...
Joakim Nivre, Laura Rimell, Ryan T. McDonald, Carl...