Sciweavers

1421 search results - page 17 / 285
» The First and Second Max-SAT Evaluations
Sort
View
ICPR
2000
IEEE
14 years 8 months ago
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)
Biometrics-based authentication is becoming popular because of increasing ease-of-use and reliability. Performance evaluation of such systems is an important issue. We attempt to ...
Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha
ISORC
2007
IEEE
14 years 1 months ago
Evaluating Real-Time Publish/Subscribe Service Integration Approaches in QoS-Enabled Component Middleware
As quality of service (QoS)-enabled component middleware technologies gain widespread acceptance to build distributed real-time and embedded (DRE) systems, it becomes necessary fo...
Gan Deng, Ming Xiong, Aniruddha S. Gokhale, George...
E2EMON
2006
IEEE
14 years 1 months ago
Implementation and Evaluation of a Protocol for Detecting Network-Wide Threshold Crossing Alerts
— Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a cert...
Fetahi Wuhib, Rolf Stadler, Alexander Clemm
LREC
2010
139views Education» more  LREC 2010»
13 years 9 months ago
PASSAGE Syntactic Representation: a Minimal Common Ground for Evaluation
The current PASSAGE syntactic representation is the result of 9 years of constant evolution with the aim of providing a common ground for evaluating parsers of French whatever the...
Anne Vilnat, Patrick Paroubek, Eric Villemonte de ...
PUC
2008
81views more  PUC 2008»
13 years 7 months ago
Using job-shop scheduling tasks for evaluating collocated collaboration
Researchers have begun to explore tools that allow multiple users to collaborate across multiple devices in collocated environments. These tools often allow users to simultaneously...
Desney S. Tan, Darren Gergle, Regan L. Mandryk, Ko...