Sciweavers

24 search results - page 2 / 5
» NESSIE: A European Approach to Evaluate Cryptographic Algori...
Sort
View
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
13 years 9 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
CLEF
2009
Springer
13 years 6 months ago
Search Path Visualization and Session Performance Evaluation with Log Files
Our approach to the Log Analysis for Digital Societies (LADS) task of LogCLEF 2009 is to define three different levels of performance: success, failure and strong failure. To inve...
Katrin Lamm, Thomas Mandl, Ralph Koelle
VLC
2008
314views more  VLC 2008»
13 years 4 months ago
A survey of methods for image annotation
In order to evaluate automated image annotation and object recognition algorithms, ground truth in the form of a set of images correctly annotated with text describing each image ...
Allan Hanbury
ICML
2008
IEEE
14 years 6 months ago
Modified MMI/MPE: a direct evaluation of the margin in speech recognition
In this paper we show how common speech recognition training criteria such as the Minimum Phone Error criterion or the Maximum Mutual Information criterion can be extended to inco...
Georg Heigold, Hermann Ney, Ralf Schlüter, Th...
ECCV
2004
Springer
13 years 11 months ago
AQUATICS Reconstruction Software: The Design of a Diagnostic Tool Based on Computer Vision Algorithms
Computer vision methods can be applied to a variety of medical and surgical applications, and many techniques and algorithms are available that can be used to recover 3D shapes and...
Andrea Giachetti, Gianluigi Zanetti