Sciweavers

SPEECH
2008
75views more  SPEECH 2008»
13 years 4 months ago
Relations between de-facto criteria in the evaluation of a spoken dialogue system
Evaluation of spoken dialogue systems has been traditionally carried out in terms of instrumentally or expert-derived measures (usually called ``objective" evaluation) and qu...
Zoraida Callejas, Ramón López-C&oacu...
JMM2
2008
116views more  JMM2 2008»
13 years 4 months ago
Multi-Scale Criteria for the Evaluation of Image Segmentation Algorithms
Abstract-- This paper deals with evaluation of image segmentation methods. We start with a state-of-the art of the evaluation criteria, involving a reference segmentation or not. B...
Sylvie Philipp-Foliguet, Laurent Guigues
CASCON
1996
164views Education» more  CASCON 1996»
13 years 5 months ago
Defining factors, goals and criteria for reusable component evaluation
: This paper presents an approach for defining evaluation criteria for reusable software components. We introduce a taxonomy of factors that influence selection, describe each of t...
Jyrki Kontio, Gianluigi Caldiera, Victor R. Basili
ICMCS
1999
IEEE
131views Multimedia» more  ICMCS 1999»
13 years 8 months ago
A Method for Evaluating Multimedia Learning Software
We submit a method (EMPI: Evaluation of Multimedia, Pedagogical and Interactive software) to evaluate multimedia software used in educational context. Our purpose is to help users...
Stéphane Crozat, Olivier Hû, Philippe...
DIAU
2000
Springer
13 years 8 months ago
Protection Profiles for Remailer Mixes
In the past independent IT security evaluation according to published criteria has not realized its potential for the assessment of privacy enhancing technologies (PETs). Main rea...
Giovanni Iachello, Kai Rannenberg
ACSAC
2000
IEEE
13 years 8 months ago
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, ...
Kai Rannenberg, Giovanni Iachello
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
13 years 9 months ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
COMPSAC
2006
IEEE
13 years 10 months ago
Testability of Software in Service-Oriented Architecture
Service-Oriented Architecture (SOA) is a system architecture in which a collection of loosely coupled services communicate with each other using standard interfaces and message-ex...
Wei-Tek Tsai, Jerry Gao, Xiao Wei, Yinong Chen
CIDM
2007
IEEE
13 years 10 months ago
Measuring the Validity of Document Relations Discovered from Frequent Itemset Mining
— The extension approach of frequent itemset mining can be applied to discover the relations among documents. Several schemes, i.e., n-gram, stemming, stopword removal and term w...
Kritsada Sriphaew, Thanaruk Theeramunkong