Sciweavers

570 search results - page 12 / 114
» Evaluating Usability Evaluation Methods: Criteria, Method an...
Sort
View
AOSE
2005
Springer
15 years 3 months ago
Using the Analytic Hierarchy Process for Evaluating Multi-Agent System Architecture Candidates
Abstract. Although much effort has been spent on suggesting and implementing new architectures of Multi-Agent Systems (MAS), the evaluation and comparison of these has often been d...
Paul Davidsson, Stefan J. Johansson, Mikael Svahnb...
74
Voted
PERCOM
2009
ACM
15 years 10 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
MTA
2006
283views more  MTA 2006»
14 years 9 months ago
An evaluation of image based steganography methods
- Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyo...
Karen Bailey, Kevin Curran
BMCBI
2008
117views more  BMCBI 2008»
14 years 9 months ago
New resampling method for evaluating stability of clusters
Background: Hierarchical clustering is a widely applied tool in the analysis of microarray gene expression data. The assessment of cluster stability is a major challenge in cluste...
Irina Gana Dresen, Tanja Boes, Johannes Hüsin...
ERLANG
2006
ACM
15 years 3 months ago
Evaluation of database management systems for Erlang
Erlang/OTP's DBMS Mnesia is lacking in several important areas to consider when implementing very large databases with massive scalability requirements. This article reveals ...
Emil Hellman