Sciweavers

2237 search results - page 399 / 448
» Analysis and Testing of Web Applications
Sort
View
ECIS
2003
15 years 15 days ago
The method evaluation model: a theoretical model for validating information systems design methods
Information Systems (IS) design research tends to emphasise the development of new methods (normative research), while addressing the evaluation of methods in only a limited fashi...
Daniel L. Moody
94
Voted
NAACL
2001
15 years 15 days ago
Learning Optimal Dialogue Management Rules by Using Reinforcement Learning and Inductive Logic Programming
Developing dialogue systems is a complex process. In particular, designing efficient dialogue management strategies is often difficult as there are no precise guidelines to develo...
Renaud Lecoeuche
75
Voted
SSWMC
2004
15 years 15 days ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
WISES
2004
15 years 15 days ago
Embedded Real-Time-Tracer - An Approach with IDE
-- Debugging software that runs on highly integrated System-on-Chip devices is complicated because conventional debug tools (like traditional In-Circuit Emulators and Logic Analyze...
Babak Rahbaran, Matthias Függer, Andreas Stei...
WSCG
2003
188views more  WSCG 2003»
15 years 14 days ago
Camera Self-Calibration in Underwater Environment
This paper presents a self-calibration technique for a camera mounted on an underwater vehicle designed to perform the 3D reconstruction of underwater scenes. Our aim is to identi...
N. Pessel, Jan Opderbecke, Marie-José Aldon