Sciweavers

1022 search results - page 165 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
IPPS
1998
IEEE
13 years 11 months ago
Performance Range Comparison via Crossing Point Analysis
Parallel programming is elusive. The relative performance of di erent parallel implementations varies with machine architecture, system and problem size. How to compare di erent i...
Xian-He Sun
ISBI
2007
IEEE
14 years 2 months ago
Segmentation of Mammosphere Structures from Volumetric Data
3D cell culture assays have emerged as the basis of an improved model system for evaluating therapeutic agents, molecular probes, and exogenous stimuli. However, there is a gap in...
Ju Han, Hang Chang, Qing Yang, Mary Helen Barcello...
ICPR
2006
IEEE
14 years 8 months ago
Precision-recall operating characteristic (P-ROC) curves in imprecise environments
Traditionally, machine learning algorithms have been evaluated in applications where assumptions can be reliably made about class priors and/or misclassification costs. In this pa...
Thomas Landgrebe, Pavel Paclík, Robert P. W...
CHI
2010
ACM
14 years 2 months ago
Code bubbles: a working set-based interface for code understanding and maintenance
Developers spend significant time reading and navigating code fragments spread across multiple locations. The filebased nature of contemporary IDEs makes it prohibitively difficul...
Andrew Bragdon, Robert C. Zeleznik, Steven P. Reis...
CIVR
2007
Springer
149views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Video copy detection: a comparative study
This paper presents a comparative study of methods for video copy detection. Different state-of-the-art techniques, using various kinds of descriptors and voting functions, are d...
Julien Law-To, Li Chen, Alexis Joly, Ivan Laptev, ...