Sciweavers

410 search results - page 16 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
GI
2004
Springer
14 years 1 months ago
Quality Criteria for Competency Assignments: Examples from a Project Management Case Study
: We present several quality criteria for skills management initiatives based on the competence-performance approach [Kor97]. The criteria help to measure reliability and validity ...
Tobias Ley, Dietrich Albert
NAACL
2003
13 years 9 months ago
Evaluating the Evaluation: A Case Study Using the TREC 2002 Question Answering Track
Evaluating competing technologies on a common problem set is a powerful way to improve the state of the art and hasten technology transfer. Yet poorly designed evaluations can was...
Ellen M. Voorhees
CASES
2010
ACM
13 years 5 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
BPM
2007
Springer
258views Business» more  BPM 2007»
13 years 11 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
BMCBI
2004
113views more  BMCBI 2004»
13 years 7 months ago
Oligo kernels for datamining on biological sequences: a case study on prokaryotic translation initiation sites
Background: Kernel-based learning algorithms are among the most advanced machine learning methods and have been successfully applied to a variety of sequence classification tasks ...
Peter Meinicke, Maike Tech, Burkhard Morgenstern, ...