Sciweavers

14895 search results - page 33 / 2979
» Evaluating The Regret System
Sort
View
RECSYS
2010
ACM
13 years 7 months ago
Beyond accuracy: evaluating recommender systems by coverage and serendipity
When we evaluate the quality of recommender systems (RS), most approaches only focus on the predictive accuracy of these systems. Recent works suggest that beyond accuracy there i...
Mouzhi Ge, Carla Delgado-Battenfeld, Dietmar Janna...
TSE
1998
96views more  TSE 1998»
13 years 7 months ago
The Use of Cooperation Scenarios in the Design and Evaluation of a CSCW System
—Design and evaluation of groupware systems raise questions which do not have to be addressed in the context of single user systems. The designer has to take into account not onl...
Oliver Stiemerling, Armin B. Cremers
ACSAC
2006
IEEE
14 years 1 months ago
Automatic Evaluation of Intrusion Detection Systems
An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
Frédéric Massicotte, François...
IR
2000
13 years 7 months ago
A Task-Oriented Non-Interactive Evaluation Methodology for Information Retrieval Systems
Past research has identified many different types of relevance in information retrieval (IR). So far, however, most evaluation of IR systems has been through batch experiments cond...
Jane Reid
COMPSAC
2005
IEEE
14 years 1 months ago
Availability Evaluation of Hardware/Software Systems with Several Recovery Procedures
The use of several distinct recovery procedures is one of the techniques that can be used to ensure high availability and fault-tolerance of computer systems. This method has been...
Sergiy A. Vilkomir, David Lorge Parnas, Veena B. M...