Sciweavers

2266 search results - page 135 / 454
» How Not to Evaluate a Developmental System
Sort
View
TREC
2004
14 years 11 months ago
Overview of the TREC 2004 Terabyte Track
The Terabyte Track explores how adhoc retrieval and evaluation techniques can scale to terabyte-sized collections. For TREC 2004, our first year, 50 new adhoc topics were created ...
Charles L. A. Clarke, Nick Craswell, Ian Soboroff
GRAPHICSINTERFACE
2004
14 years 11 months ago
Revisiting Display Space Management: Understanding Current Practice to Inform Next-generation Design
Most modern computer systems allow the user to control the space allocated to interfaces through a window system. While much of the understanding of how people interact with windo...
Dugald Ralph Hutchings, John T. Stasko
MMS
2007
14 years 9 months ago
Collaborative video searching on a tabletop
Almost all system and application design for multimedia systems is based around a single user working in isolation to perform some task yet much of the work for which we use comput...
Alan F. Smeaton, Hyowon Lee, Colum Foley, Sin&eacu...
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 4 months ago
Application of Logic and Decision Models in Sustainable Ecosystem Management
The Northern Region of the USDA Forest Service is using the Ecosystem Management Decision Support System (EMDS) to evaluate ecosystem sustainability for National Forest plan revis...
Mark Jensen, Keith Reynolds, Ute Langner, Melissa ...
ER
2009
Springer
166views Database» more  ER 2009»
15 years 4 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone