Sciweavers

5489 search results - page 91 / 1098
» Evaluating evaluation measure stability
Sort
View
ESORICS
2006
Springer
15 years 3 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
AICCSA
2005
IEEE
129views Hardware» more  AICCSA 2005»
15 years 1 months ago
Enhanced visual evaluation of feature extractors for image mining
Plus BROWSE SEARCH IEEE XPLORE GUIDE SUPPORT View TOC Enhanced visual evaluation of feature extractors for image mining Rodrigues, J.F., Jr. Traina, A.J.M. Traina, C., Jr. Comput. ...
José Fernando Rodrigues Jr., Agma J. M. Tra...
SIMVIS
2004
15 years 1 months ago
Evaluation and Optimization of Laser Scan Data
The digitalization of objects from the real world is of great importance, e. g., in many multimedia applications, in 3D computer graphics, and in industrial measurement. In partic...
Christian Teutsch, Erik Trostmann, Michael Weber, ...
ADHOC
2008
135views more  ADHOC 2008»
15 years 1 days ago
Rapid design and evaluation framework for wireless sensor networks
The diversity of applications and typically scarce node resources set very tight constraints to Wireless Sensor Networks (WSN). It is not possible to fulfill all requirements with...
Mauri Kuorilehto, Marko Hännikäinen, Tim...
ICASSP
2011
IEEE
14 years 3 months ago
Evaluating music sequence models through missing data
Building models of the structure in musical signals raises the question of how to evaluate and compare different modeling approaches. One possibility is to use the model to impute...
Thierry Bertin-Mahieux, Graham Grindlay, Ron J. We...