Sciweavers

810 search results - page 117 / 162
» Modeling User Runtime Estimates
Sort
View
ICPR
2008
IEEE
14 years 10 months ago
On using error bounds to optimize cost-sensitive multimodal biometric authentication
While using more biometric traits in multimodal biometric fusion can effectively increase the system robustness, often, the cost associated to adding additional systems is not con...
Norman Poh, Josef Kittler
EUROMICRO
2007
IEEE
14 years 3 months ago
Scope Management of Non-Functional Requirements
Getting business stakeholders’ goals formulated clearly and project scope defined realistically increases the chance of success for any application development process. As a cons...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva
SIGIR
2005
ACM
14 years 2 months ago
Combining eye movements and collaborative filtering for proactive information retrieval
We study a new task, proactive information retrieval by combining implicit relevance feedback and collaborative filtering. We have constructed a controlled experimental setting, ...
Kai Puolamäki, Jarkko Salojärvi, Eerika ...
ISW
2009
Springer
14 years 3 months ago
Adding Trust to P2P Distribution of Paid Content
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver th...
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos...
BMCBI
2010
185views more  BMCBI 2010»
13 years 9 months ago
ABCtoolbox: a versatile toolkit for approximate Bayesian computations
Background: The estimation of demographic parameters from genetic data often requires the computation of likelihoods. However, the likelihood function is computationally intractab...
Daniel Wegmann, Christoph Leuenberger, Samuel Neue...