Sciweavers

405 search results - page 26 / 81
» Avatar-centric Risk Evaluation
Sort
View
IJCNN
2007
IEEE
15 years 4 months ago
Evaluation of Performance Measures for SVR Hyperparameter Selection
— To obtain accurate modeling results, it is of primal importance to find optimal values for the hyperparameters in the Support Vector Regression (SVR) model. In general, we sea...
Koen Smets, Brigitte Verdonk, Elsa Jordaan
81
Voted
JPDC
2007
86views more  JPDC 2007»
14 years 9 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin
JCIT
2008
102views more  JCIT 2008»
14 years 9 months ago
Architectural Patterns for Finding your
The paper discusses the innovative patterns such as subtraction, multiplication, division, task unification and attribute dependency change for evaluating the software architectur...
N. Sankar Ram, Paul Rodrigues
TR
2008
98views more  TR 2008»
14 years 9 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 4 months ago
E-File Adoption: A Study of U.S. Taxpayers' Intentions
In the United States, congress has set goals for the diffusion of e-government initiatives. One of congress’ goals for 2007 was for 80% of tax and informational returns to be fil...
L. Christian Schaupp, Lemuria Carter, Jeff Hobbs