Sciweavers

3511 search results - page 217 / 703
» Evaluation Methods for Groupware Systems
Sort
View
ECIR
2008
Springer
15 years 6 months ago
Here or There
Abstract. Information retrieval systems have traditionally been evaluated over absolute judgments of relevance: each document is judged for relevance on its own, independent of oth...
Ben Carterette, Paul N. Bennett, David Maxwell Chi...
CLEF
2008
Springer
15 years 6 months ago
Overview of the ImageCLEFphoto 2008 Photographic Retrieval Task
ImageCLEFphoto 2008 is an ad-hoc photo retrieval task and part of the ImageCLEF evaluation campaign. This task provides both the resources and the framework necessary to perform c...
Thomas Arni, Paul Clough, Mark Sanderson, Michael ...
IWIA
2003
IEEE
15 years 9 months ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
CBSQ
2003
Springer
15 years 9 months ago
COTS-Based Requirements Engineering
There is growing interest in the notion of software development through the planned integration of COTS (Commercial Off-The-Shelf) products. The potential advantages of this integ...
Carina Alves
IJSEKE
2000
111views more  IJSEKE 2000»
15 years 4 months ago
An Approach to Quantitative Software Architecture Sensitivity Analysis
Software architectures are often claimed to be robust. However, there is no explicit and concrete definition of software architecture robustness. This paper gives a definition of ...
Chung-Horng Lung, Kalai Kalaichelvan