Sciweavers

788 search results - page 32 / 158
» Evaluating Current Testing Processes of Web-Portal Applicati...
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Effective background data selection in SVM speaker recognition for unseen test environment: More is not always better
This study focuses on determining a procedure to select effective negative examples for development of improved Support Vector Machine (SVM) based speaker recognition. Selection o...
Jun-Won Suh, Yun Lei, Wooil Kim, John H. L. Hansen
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 1 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
PAM
2012
Springer
12 years 3 months ago
OFLOPS: An Open Framework for OpenFlow Switch Evaluation
Recent efforts in software-defined networks, such as OpenFlow, give unprecedented access into the forwarding plane of networking equipment. When building a network based on OpenFl...
Charalampos Rotsos, Nadi Sarrar, Steve Uhlig, Rob ...
NETGAMES
2005
ACM
14 years 1 months ago
Framework for evaluation of networked mobile games
In this position paper we propose an evaluation framework for networked mobile gaming, consisting of user, group, communication, and environment models. Each of these components a...
Leo Petrak, Olaf Landsiedel, Klaus Wehrle
CTW
2006
88views more  CTW 2006»
13 years 7 months ago
Using multiple cognitive task analysis methods for supervisory control interface design in high-throughput biological screening
Cognitive task analysis (CTA) approaches are currently needed in many domains to provide explicit guidance on redesigning existing systems. This study used goal-directed task analy...
David B. Kaber, Noa Segall, Rebecca S. Green, K. E...