Sciweavers

7536 search results - page 67 / 1508
» The CLEAR 2007 Evaluation
Sort
View
DAWAK
2006
Springer
13 years 11 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
LREC
2008
139views Education» more  LREC 2008»
13 years 9 months ago
Automatic Learning and Evaluation of User-Centered Objective Functions for Dialogue System Optimisation
The ultimate goal when building dialogue systems is to satisfy the needs of real users, but quality assurance for dialogue strategies is a non-trivial problem. The applied evaluat...
Verena Rieser, Oliver Lemon
CHI
2009
ACM
14 years 8 months ago
Evaluating existing audio CAPTCHAs and an interface optimized for non-visual use
Audio CAPTCHAs were introduced as an accessible alternative for those unable to use the more common visual CAPTCHAs, but anecdotal accounts have suggested that they may be more di...
Jeffrey P. Bigham, Anna Cavender
VTC
2008
IEEE
106views Communications» more  VTC 2008»
14 years 2 months ago
Simulation-Based Performance Evaluation of Enhanced Broadcast Schemes for IEEE 802.11-Based Vehicular Networks
—Car-to-car communication (C2CC) enables cars to exchange information that can be used to, e.g., improve the drivers’ safety or comfort. Recently, WLANs based on the IEEE 802.1...
Yvonne Mertens, Matthias Wellens, Petri Mäh&o...
ICMCS
2006
IEEE
94views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Evaluation of Practical Scalability of Overlay Networks in Providing Video-on-Demand Service
Recently, overlay networks have been proposed to address the problem of scalability in providing video-on-demand (VoD) service. However, from the perspective of service providing,...
Jian-Guang Luo, Yun Tang, Jiang Zhang, Shiqiang Ya...