Sciweavers

4650 search results - page 56 / 930
» Generating and evaluating evaluative arguments
Sort
View
IJCAI
2003
13 years 10 months ago
Evaluating Matching Algorithms: the Monotonicity Principle
In this paper we present the monotonicity principle, a sufficient condition to ensure that exact mapping, a mapping as would be performed by a human observer, is ranked close to ...
Ateret Anaby-Tavor, Avigdor Gal, Alberto Trombetta
ACIVS
2008
Springer
14 years 3 months ago
Towards Fully Automatic Image Segmentation Evaluation
Spatial region (image) segmentation is a fundamental step for many computer vision applications. Although many methods have been proposed, less work has been done in developing sui...
Lutz Goldmann, Tomasz Adamek, Peter Vajda, Mustafa...
ACSAC
2006
IEEE
14 years 2 months ago
Automatic Evaluation of Intrusion Detection Systems
An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
Frédéric Massicotte, François...
FSE
1997
Springer
246views Cryptology» more  FSE 1997»
14 years 12 days ago
Fast Message Authentication Using Efficient Polynomial Evaluation
Abstract. Message authentication codes (MACs) using polynomial evaluation have the advantage of requiring a very short key even for very large messages. We describe a low complexit...
Valentine Afanassiev, Christian Gehrmann, Ben J. M...
CLEF
2008
Springer
13 years 10 months ago
On the Evaluation of Snippet Selection for WebCLEF
WebCLEF is about supporting a user who is an expert in writing a survey article on a specific topic with a clear goal and audience by generating a ranked list with relevant snippet...
Arnold Overwijk, Dong Nguyen, Claudia Hauff, Dolf ...