Sciweavers

698 search results - page 31 / 140
» Evaluating Key Statements Analysis
Sort
View
CHI
2002
ACM
14 years 10 months ago
Cognitive walkthrough for the web
This paper proposes a transformation of the Cognitive Walkthrough (CW), a theory-based usability inspection method that has proven useful in designing applications that support us...
Marilyn Hughes Blackmon, Peter G. Polson, Muneo Ki...
PRL
2008
103views more  PRL 2008»
13 years 9 months ago
A study on the relevance criteria for medical images
This paper reports the results of a study investigating the relevance criteria used by health care professionals when seeking medical images. Data was collected from 26 participan...
Shahram Sedghi, Mark Sanderson, Paul Clough
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 4 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
MEDIAFORENSICS
2010
13 years 11 months ago
A framework for theoretical analysis of content fingerprinting
The popularity of video sharing platforms such as Youtube has prompted the need for the development of efficient techniques for multimedia identification. Content fingerprinting i...
Avinash L. Varna, Wei-Hong Chuang, Min Wu
JUCS
2008
99views more  JUCS 2008»
13 years 9 months ago
A Normal Copula Model for the Economic Risk Analysis of Correlated Failures in Communications Networks
: The reliability of a communications network is often evaluated without taking into account the economic consequence of failures. Here a new approach is proposed to assess the eco...
Maurizio Naldi, Giuseppe D'Acquisto