Sciweavers

211 search results - page 8 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
TMM
2010
141views Management» more  TMM 2010»
13 years 2 months ago
Speech Emotion Analysis: Exploring the Role of Context
Automated analysis of human affective behavior has attracted increasing attention in recent years. With the research shift toward spontaneous behavior, many challenges have come to...
Ashish Tawari, Mohan M. Trivedi
GLOBECOM
2008
IEEE
14 years 2 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
ACSAC
2000
IEEE
13 years 12 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
DEXAW
2009
IEEE
95views Database» more  DEXAW 2009»
13 years 11 months ago
Collection-Relative Representations: A Unifying View to Retrieval Models
Various retrieval models have been developed and analyzed so far, but less research aims to an integration of the different models within a common framework. This paper introduces ...
Benno Stein, Maik Anderka
ECIR
2007
Springer
13 years 9 months ago
A Retrieval Evaluation Methodology for Incomplete Relevance Assessments
In this paper we a propose an extended methodology for laboratory based Information Retrieval evaluation under incomplete relevance assessments. This new protocol aims to identify ...
Mark Baillie, Leif Azzopardi, Ian Ruthven