Sciweavers

405 search results - page 21 / 81
» Avatar-centric Risk Evaluation
Sort
View
74
Voted
CIKM
2009
Springer
15 years 4 months ago
Reducing the risk of query expansion via robust constrained optimization
We introduce a new theoretical derivation, evaluation methods, and extensive empirical analysis for an automatic query expansion framework in which model estimation is cast as a r...
Kevyn Collins-Thompson
TITB
2008
102views more  TITB 2008»
14 years 9 months ago
Nonlinear Support Vector Machine Visualization for Risk Factor Analysis Using Nomograms and Localized Radial Basis Function Kern
Nonlinear classifiers, e.g., support vector machines (SVMs) with radial basis function (RBF) kernels, have been used widely for automatic diagnosis of diseases because of their hig...
Baek Hwan Cho, Hwanjo Yu, Jong Shill Lee, Young Jo...
ICSE
2009
IEEE-ACM
14 years 7 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
68
Voted
EOR
2006
105views more  EOR 2006»
14 years 9 months ago
Evaluating cost taxonomies for information systems management
The consideration of costs, benefits and risks underpin many Information System (IS) evaluation decisions. Yet, vendors and project-champions alike tend to identify and focus much...
Zahir Irani, Ahmad Ghoneim, Peter E. D. Love
AVI
2006
14 years 11 months ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...