Sciweavers

1818 search results - page 356 / 364
» How users use access control
Sort
View
BMCBI
2011
13 years 2 months ago
pROC: an open-source package for R and S+ to analyze and compare ROC curves
Background: Receiver operating characteristic (ROC) curves are useful tools to evaluate classifiers in biomedical and bioinformatics applications. However, conclusions are often r...
Xavier Robin, Natacha Turck, Alexandre Hainard, Na...
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
14 years 3 days ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
WWW
2003
ACM
14 years 8 months ago
Personal Voice Call Assistant: VoiceXML and SIP in a Distributed Environment
In this paper we introduce the architecture of a distributed service platform that integrates speech, web technology and voice-overIP technologies and describe how a specific serv...
Michael Pucher, Julia Tertyshnaya, Florian Wegsche...
HRI
2009
ACM
14 years 2 months ago
An affective guide robot in a shopping mall
To explore possible robot tasks in daily life, we developed a guide robot for a shopping mall and conducted a field trial with it. The robot was designed to interact naturally wit...
Takayuki Kanda, Masahiro Shiomi, Zenta Miyashita, ...
WCRE
2009
IEEE
14 years 2 months ago
SQUAD: Software Quality Understanding through the Analysis of Design
—Object-oriented software quality models usually use metrics of classes and of relationships among classes to assess the quality of systems. However, software quality does not de...
Foutse Khomh