Sciweavers

1036 search results - page 6 / 208
» Evaluating Mixed-Initiative Systems: An Experimental Approac...
Sort
View
ICIAR
2010
Springer
14 years 2 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
ACL
2010
13 years 8 months ago
Beetle II: A System for Tutoring and Computational Linguistics Experimentation
We present BEETLE II, a tutorial dialogue system designed to accept unrestricted language input and support experimentation with different tutorial planning and dialogue strategie...
Myroslava Dzikovska, Johanna D. Moore, Natalie B. ...
IWQOS
2001
Springer
14 years 2 months ago
Experimental Extensions to RSVP - Remote Client and One-Pass Signalling
We present and evaluate two experimental extensions to RSVP in terms of protocol specification and implementation. These extensions are targeted at apparent shortcomings of RSVP to...
Martin Karsten
JCDL
2011
ACM
374views Education» more  JCDL 2011»
13 years 25 days ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
CLEIEJ
2010
13 years 7 months ago
Empirical Validation of Component-based Software Systems Generation and Evaluation Approaches
Component-based software development needs to formalize a process of generation, evaluation and selection of Composite COTS-based Software Systems (CCSS), enabling software archit...
Victor Sagredo, Carlos Becerra, Gonzalo Valdes