Sciweavers

3511 search results - page 204 / 703
» Evaluation Methods for Groupware Systems
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 10 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
CODES
2008
IEEE
15 years 6 months ago
A performance-oriented hardware/software partitioning for datapath applications
This article proposes a hardware/software partitioning method targeted to performance-constrained systems for datapath applications. Exploiting a platform based design, a Timed Pe...
Laura Frigerio, Fabio Salice
INFOCOM
2012
IEEE
13 years 7 months ago
DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks
Abstract—Energy is the most precious resource in wireless sensor networks. To ensure sustainable operations, wireless sensor systems need to harvest energy from environments. The...
Ting Zhu, Abedelaziz Mohaisen, Yi Ping, Don Towsle...
INEX
2005
Springer
15 years 10 months ago
Overview of INEX 2005
Since 2002, INEX has been working towards the goal of establishing an infrastructure, in the form of a large XML test collection and appropriate scoring methods, for the evaluation...
Saadia Malik, Gabriella Kazai, Mounia Lalmas, Norb...
ACL
2012
13 years 6 months ago
Concept-to-text Generation via Discriminative Reranking
This paper proposes a data-driven method for concept-to-text generation, the task of automatically producing textual output from non-linguistic input. A key insight in our approac...
Ioannis Konstas, Mirella Lapata