Sciweavers

1022 search results - page 130 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
VL
2010
IEEE
216views Visual Languages» more  VL 2010»
13 years 7 months ago
Explanatory Debugging: Supporting End-User Debugging of Machine-Learned Programs
Many machine-learning algorithms learn rules of behavior from individual end users, such as taskoriented desktop organizers and handwriting recognizers. These rules form a “prog...
Todd Kulesza, Simone Stumpf, Margaret M. Burnett, ...
FSS
2007
167views more  FSS 2007»
13 years 8 months ago
Fuzzy fusion for skin detection
Complex image processing tasks rarely succeed through the application of just one methodology. The implementation of different methodologies, whose treatment of the input images i...
Aureli Soria-Frisch, Rodrigo Verschae, Aitor Olano
TMC
2011
1105views more  TMC 2011»
13 years 4 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
DBISP2P
2003
Springer
152views Database» more  DBISP2P 2003»
14 years 2 months ago
An Adaptive and Scalable Middleware for Distributed Indexing of Data Streams
Abstract. We are witnessing a dramatic increase in the use of datacentric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and various ...
Ahmet Bulut, Roman Vitenberg, Fatih Emekçi,...
IPPS
2005
IEEE
14 years 2 months ago
Measuring Scalability of Resource Management Systems
Scalability refers to the extent of configuration modifications over which a system continues to be economically deployable. Until now, scalability of resource management system...
Arindam Mitra, Muthucumaru Maheswaran, Shoukat Ali