Sciweavers

1519 search results - page 144 / 304
» What do they think
Sort
View
DGO
2007
125views Education» more  DGO 2007»
13 years 12 months ago
Members of congress websites: diffusion at the tip of the iceberg
How do Members of Congress manage the opportunities that the Internet offers? Here we present the initial results from interviews with 100 Congressional offices about their decisi...
David Lazer, Ines Mergel, Curt Ziniel, Kevin Ester...
ISSA
2008
13 years 12 months ago
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
Tony Stephanou, Rabelani Dagada
LREC
2008
91views Education» more  LREC 2008»
13 years 12 months ago
Classification Procedures for Software Evaluation
We outline a methodological classification for evaluation approaches of software in general. This classification was initiated partly owing to involvement in a biennial European c...
Muriel Amar, Sophie David, Rachel Panckhurst, Lisa...
LREC
2008
107views Education» more  LREC 2008»
13 years 12 months ago
An Experimental Methodology for an End-to-End Evaluation in Speech-to-Speech Translation
This paper describes the evaluation methodology used to evaluate the TC-STAR speech-to-speech translation (SST) system and their results from the third year of the project. It fol...
Olivier Hamon, Djamel Mostefa
IJCAI
2007
13 years 12 months ago
Privacy and Artificial Agents, or, Is Google Reading My Email?
We investigate legal and philosophical notions of privacy in the context of artificial agents. Our analysis utilizes a normative account of privacy that defends its value and the ...
Samir Chopra, Laurence White