Sciweavers

1414 search results - page 207 / 283
» Combining Intruder Theories
Sort
View
ECIS
2003
14 years 11 months ago
Usability in social action: reinterpreting effectiveness efficiency and satisfaction
One of the most important qualities related to the use of information systems is arguably the usability achieved in actual use-situations. Three central criteria for usability as ...
Pär J. Ågerfalk, Owen Eriksson
ECIS
2003
14 years 11 months ago
The method evaluation model: a theoretical model for validating information systems design methods
Information Systems (IS) design research tends to emphasise the development of new methods (normative research), while addressing the evaluation of methods in only a limited fashi...
Daniel L. Moody
NIPS
2004
14 years 11 months ago
Limits of Spectral Clustering
An important aspect of clustering algorithms is whether the partitions constructed on finite samples converge to a useful clustering of the whole data space as the sample size inc...
Ulrike von Luxburg, Olivier Bousquet, Mikhail Belk...
NIPS
2001
14 years 11 months ago
Probabilistic principles in unsupervised learning of visual structure: human data and a model
To find out how the representations of structured visual objects depend on the co-occurrence statistics of their constituents, we exposed subjects to a set of composite images wit...
Shimon Edelman, Benjamin P. Hiles, Hwajin Yang, Na...
NIPS
2001
14 years 11 months ago
Online Learning with Kernels
Abstract--Kernel-based algorithms such as support vector machines have achieved considerable success in various problems in batch setting, where all of the training data is availab...
Jyrki Kivinen, Alex J. Smola, Robert C. Williamson