Sciweavers

2006 search results - page 319 / 402
» MUC-5 evaluation metrics
Sort
View
METRICS
1998
IEEE
14 years 1 months ago
Getting a Handle on the Fault Injection Process: Validation of Measurement Tools
In any manufacturing environment, the fault injection rate might be considered one of the most meaningful criterion to evaluate the goodness of the development process. In our fie...
Sebastian G. Elbaum, John C. Munson
AI
1998
Springer
14 years 1 months ago
A Hybrid Convergent Method for Learning Probabilistic Networks
During past few years, a variety of methods have been developed for learning probabilistic networks from data, among which the heuristic single link forward or backward searches ar...
Jun Liu, Kuo-Chu Chang, Jing Zhou
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 29 days ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
EXPCS
2007
14 years 25 days ago
An analysis of XML compression efficiency
XML simplifies data exchange among heterogeneous computers, but it is notoriously verbose and has spawned the development of many XML-specific compressors and binary formats. We p...
Christopher J. Augeri, Dursun A. Bulutoglu, Barry ...
ICAIL
2007
ACM
14 years 25 days ago
Mapping regulations to industry-specific taxonomies
For each industry, there exist many taxonomies that are intended for various applications. There are also multiple sources of regulations from different government agencies. Indus...
Chin Pang Cheng, Gloria T. Lau, Kincho H. Law