Sciweavers

2025 search results - page 354 / 405
» Software performance modelling using PEPA nets
Sort
View
SIGIR
2006
ACM
14 years 1 months ago
Statistical precision of information retrieval evaluation
We introduce and validate bootstrap techniques to compute confidence intervals that quantify the effect of test-collection variability on average precision (AP) and mean average...
Gordon V. Cormack, Thomas R. Lynam
HICSS
2003
IEEE
202views Biometrics» more  HICSS 2003»
14 years 1 months ago
Automated Coaching of Collaboration Based on Workspace Analysis: Evaluation and Implications for Future Learning Environments
This paper describes the design and evaluation of COLER, a computer mediated learning environment that includes a software coach to help students collaborate while solving Entity ...
María de los Angeles Constantino-Gonz&aacut...
FSTTCS
2003
Springer
14 years 29 days ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
AAAI
2008
13 years 10 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 5 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto