Sciweavers

405 search results - page 24 / 81
» Avatar-centric Risk Evaluation
Sort
View
ICTAI
2007
IEEE
15 years 4 months ago
On Evaluation Methodologies for Text Segmentation Algorithms
The WindowDiff evaluation measure [12] is becoming the standard criterion for evaluating text segmentation methods. Nevertheless, this metric is really not fair with regard to the...
Sylvain Lamprier, Tassadit Amghar, Bernard Levrat,...
AMW
2011
14 years 1 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
IEEEARES
2006
IEEE
15 years 3 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...
66
Voted
EOR
2008
77views more  EOR 2008»
14 years 9 months ago
Evaluation of firm's loss due to incomplete information in real investment decision
We investigate the effect of incomplete information in a model where a start-up with a unique idea and technology pioneers a new market but will eventually be expelled from the ma...
Michi Nishihara, Masao Fukushima
59
Voted
ICRA
2008
IEEE
145views Robotics» more  ICRA 2008»
15 years 4 months ago
Injury evaluation of human-robot impacts
— Currently, large efforts are unertaken to bring robotic applications to domestic environments. Especially physical human-robot cooperation is a major concern and various design...
Sami Haddadin, Alin Albu-Schäffer, Michael St...