Sciweavers

9124 search results - page 156 / 1825
» Requirements-Based Design Evaluation
Sort
View
ISPEC
2007
Springer
15 years 10 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
DOCENG
2007
ACM
15 years 8 months ago
Speculative document evaluation
Optimisation of real world Variable Data printing (VDP) documents is a difficult problem because the interdependencies between layout functions may drastically reduce the number o...
Alexander J. Macdonald, David F. Brailsford, Steve...
LREC
2010
175views Education» more  LREC 2010»
15 years 5 months ago
Ad-hoc Evaluations Along the Lifecycle of Industrial Spoken Dialogue Systems: Heading to Harmonisation?
With a view to rationalise the evaluation process within the Orange Labs spoken dialogue system projects, a field audit has been realised among the various related professionals. ...
Marianne Laurent, Philippe Bretier, Carole Manquil...
PUC
2008
146views more  PUC 2008»
15 years 3 months ago
Evaluating teamwork support in tabletop groupware applications using collaboration usability analysis
Tabletop groupware systems have natural advantages for collaboration, but they present a challenge for application designers because shared work and interaction progress in differe...
David Pinelle, Carl Gutwin
CIKM
2010
Springer
15 years 2 months ago
Online stratified sampling: evaluating classifiers at web-scale
Deploying a classifier to large-scale systems such as the web requires careful feature design and performance evaluation. Evaluation is particularly challenging because these larg...
Paul N. Bennett, Vitor R. Carvalho