Sciweavers

1022 search results - page 14 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
IDTRUST
2009
ACM
14 years 2 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
IADIS
2009
13 years 5 months ago
Trash article detection using categorization techniques
We explore techniques for detecting news articles containing invalid information, using the help of text categorization technology. The information that exists on the World Wide W...
Christos Bouras, Vassilis Tsogkas, Vassilis Poulop...
HICSS
2003
IEEE
177views Biometrics» more  HICSS 2003»
14 years 28 days ago
Is the Applicability of Web-Based Surveys for Academic Research Limited to the Field of Information Technology?
Currently, the Internet provides researchers with the opportunity to conduct online surveys in a more efficient and effective way than was previously allowed by traditional means....
Narcyz Roztocki, Nawal Ait Lahri
QSIC
2005
IEEE
14 years 1 months ago
Towards Goal-Oriented Design of Agent Systems
The initial step of any software engineering methodology is to form requirements. Recently, a goal-oriented approach to requirements has been proposed and argued to be beneficial...
Jason Khallouf, Michael Winikoff
LREC
2008
89views Education» more  LREC 2008»
13 years 9 months ago
Sign Language Corpus Annotation: toward a new Methodology
This paper deals with non manual gestures annotation involved in Sign Language within the context of automatic generation of Sign Language. We will tackle linguistic researches in...
Emilie Chételat-Pelé, Annelies Braff...