Sciweavers

121 search results - page 24 / 25
» Evaluating the Effect of Open Student Models on Self-Assessm...
Sort
View
108
Voted
ISSRE
2007
IEEE
14 years 11 months ago
Using In-Process Testing Metrics to Estimate Post-Release Field Quality
In industrial practice, information on the software field quality of a product is available too late in the software lifecycle to guide affordable corrective action. An important ...
Nachiappan Nagappan, Laurie Williams, Mladen A. Vo...
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
83
Voted
WS
2008
ACM
14 years 9 months ago
Recommendations based on semantically enriched museum collections
This article presents the CHIP demonstrator5 for providing personalized access to digital museum collections. It consists of three main components: Art Recommender, Tour Wizard, an...
Yiwen Wang, Natalia Stash, Lora Aroyo, Peter Gorge...
90
Voted
CVBIA
2005
Springer
15 years 3 months ago
Analyzing Anatomical Structures: Leveraging Multiple Sources of Knowledge
Analysis of medical images, especially the extraction of anatomical structures, is a critical component of many medical applications: surgical planning and navigation, and populati...
W. Eric L. Grimson, Polina Golland
IMC
2005
ACM
15 years 3 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...