Sciweavers

461 search results - page 70 / 93
» INEX 2005 Evaluation Measures
Sort
View
SOFTVIS
2005
ACM
15 years 5 months ago
Visualizing multiple evolution metrics
Observing the evolution of very large software systems is difficult because of the sheer amount of information that needs to be analyzed and because the changes performed in the s...
Martin Pinzger, Harald Gall, Michael Fischer, Mich...
VRST
2005
ACM
15 years 5 months ago
Human performance in space telerobotic manipulation
This paper considers the utility of VR in the design of the interface to a space-based telerobotic manipulator. An experiment was conducted to evaluate the potential for improved ...
Philip Lamb, Dean Owen
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
ACISP
2005
Springer
15 years 5 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven
ADHOCNOW
2005
Springer
15 years 5 months ago
Performance Analysis of the Hierarchical Layer Graph for Wireless Networks
The Hierarchical Layer Graph (HL graph) is a promising network topology for wireless networks with variable transmission ranges. It was introduced and analyzed by Meyer auf der He...
Stefan Rührup, Christian Schindelhauer, Klaus...