Sciweavers

1022 search results - page 53 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
GECCO
2010
Springer
157views Optimization» more  GECCO 2010»
13 years 11 months ago
Speeding up the evaluation of evolutionary learning systems using GPGPUs
In this paper we introduce a method for computing fitness in evolutionary learning systems based on NVIDIA’s massive parallel technology using the CUDA library. Both the match ...
María A. Franco, Natalio Krasnogor, Jaume B...
ACL
2011
12 years 11 months ago
They Can Help: Using Crowdsourcing to Improve the Evaluation of Grammatical Error Detection Systems
Despite the rising interest in developing grammatical error detection systems for non-native speakers of English, progress in the field has been hampered by a lack of informative...
Nitin Madnani, Martin Chodorow, Joel R. Tetreault,...
SUTC
2010
IEEE
13 years 6 months ago
User-Based Attestation for Trustworthy Visual Sensor Networks
Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
Thomas Winkler, Bernhard Rinner
SIGGRAPH
1997
ACM
13 years 12 months ago
Interactive simulation of fire in virtual building environments
This paper describes the integration of the Berkeley Architectural Walkthrough Program with the National Institute of Standards and Technology’s CFAST fire simulator. The integ...
Richard W. Bukowski, Carlo H. Séquin
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
14 years 1 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu