Sciweavers

570 search results - page 82 / 114
» Evaluating Usability Evaluation Methods: Criteria, Method an...
Sort
View
ICCSA
2005
Springer
15 years 3 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...
ICDCSW
2006
IEEE
15 years 3 months ago
Dealing with Class Skew in Context Recognition
As research in context recognition moves towards more maturity and real life applications, appropriate and reliable performance metrics gain importance. This paper focuses on the ...
Mathias Stäger, Paul Lukowicz, Gerhard Tr&oum...
CSDA
2006
117views more  CSDA 2006»
14 years 9 months ago
Exact maximum likelihood estimation of structured or unit root multivariate time series models
TheexactlikelihoodfunctionofaGaussianvectorautoregressive-movingaverage(VARMA)model is evaluated in two nonstandard cases: (a) a parsimonious structured form, such as obtained in ...
Guy Mélard, Roch Roy, Abdessamad Saidi
DKE
2007
115views more  DKE 2007»
14 years 9 months ago
An improved methodology on information distillation by mining program source code
This paper presents a methodology for knowledge acquisition from source code. We use data mining to support semiautomated software maintenance and comprehension and provide practi...
Yiannis Kanellopoulos, Christos Makris, Christos T...
72
Voted
ICIP
2003
IEEE
15 years 11 months ago
Sparse-parametric writer identification using heterogeneous feature groups
This paper evaluates the performance of edge-based directional probability distributions as features in writer identification in comparison to a number of non-angular features. It...
Lambert Schomaker, Marius Bulacu, Merijn van Erp