Sciweavers

9124 search results - page 16 / 1825
» Requirements-Based Design Evaluation
Sort
View
ECEASST
2010
13 years 4 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
SIGOPS
2010
105views more  SIGOPS 2010»
13 years 4 months ago
SelfTalk for Dena: query language and runtime support for evaluating system behavior
We introduce SelfTalk, a novel declarative language that allows users to query and understand the status of a large scale system. SelfTalk is sufficiently expressive to encode an ...
Saeed Ghanbari, Gokul Soundararajan, Cristiana Amz...
ICASSP
2011
IEEE
13 years 1 months ago
The MIT LL 2010 speaker recognition evaluation system: Scalable language-independent speaker recognition
Research in the speaker recognition community has continued to address methods of mitigating variational nuisances. Telephone and auxiliary-microphone recorded speech emphasize th...
Douglas E. Sturim, William M. Campbell, Najim Deha...
CHI
2011
ACM
13 years 1 months ago
Synchronous interaction among hundreds: an evaluation of a conference in an avatar-based virtual environment
This paper presents the first in-depth evaluation of a large multi-format virtual conference. The conference took place in an avatar-based 3D virtual world with spatialized audio,...
Thomas Erickson, N. Sadat Shami, Wendy A. Kellogg,...
SDM
2012
SIAM
273views Data Mining» more  SDM 2012»
12 years 6 days ago
A Framework for the Evaluation and Management of Network Centrality
Network-analysis literature is rich in node-centrality measures that quantify the centrality of a node as a function of the (shortest) paths of the network that go through it. Exi...
Vatche Ishakian, Dóra Erdös, Evimaria ...