Sciweavers

536 search results - page 4 / 108
» Quality evaluation in information systems outsourcing
Sort
View
DAC
2010
ACM
13 years 11 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
ICMCS
2008
IEEE
158views Multimedia» more  ICMCS 2008»
14 years 1 months ago
Video quality assessment and comparative evaluation of peer-to-peer video streaming systems
We design a test methodology to analyze in detail the video quality received at each peer in a peer-to-peer (P2P) video streaming system. The metrics that we employ at each peer i...
Aditya Mavlankar, Pierpaolo Baccichet, Bernd Girod...
EWCBR
2006
Springer
13 years 11 months ago
What Evaluation Criteria Are Right for CCBR? Considering Rank Quality
Abstract. Evaluation criteria for conversational CBR (CCBR) systems are important to guide development and tuning of new methods, and to enable practitioners to make informed decis...
Steven Bogaerts, David B. Leake
ICDIM
2007
IEEE
14 years 1 months ago
Minimality quality criterion evaluation for integrated schemas
: Integrated access to distributed data is an important problem faced in scientific and commercial applications. A data integration system provides a unified view for users to subm...
Maria da Conceição Moraes Batista, A...
HASE
2008
IEEE
13 years 8 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...