Sciweavers

1917 search results - page 290 / 384
» Experimenting with Nonmonotonic Reasoning
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 10 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
PR
2006
119views more  PR 2006»
13 years 10 months ago
Performance evaluation and optimization for content-based image retrieval
Performance evaluation of content-based image retrieval (CBIR) systems is an important but still unsolved problem. The reason for its importance is that only performance evaluatio...
Julia Vogel, Bernt Schiele
SIGIR
2008
ACM
13 years 10 months ago
Intuition-supporting visualization of user's performance based on explicit negative higher-order relevance
Modeling the beyond-topical aspects of relevance are currently gaining popularity in IR evaluation. For example, the discounted cumulated gain (DCG) measure implicitly models some...
Heikki Keskustalo, Kalervo Järvelin, Ari Pirk...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 10 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
SQJ
2008
116views more  SQJ 2008»
13 years 10 months ago
E-commerce system quality assessment using a model based on ISO 9126 and Belief Networks
: As business transitions into the new economy, e-system successful use has become a strategic goal. Especially in business to consumer (e-commerce) applications, users highly eval...
Antonia Stefani, Michalis Nik Xenos