Sciweavers

6715 search results - page 1129 / 1343
» Learning from a Test Set
Sort
View
CHI
2005
ACM
16 years 5 months ago
A method to standardize usability metrics into a single score
Current methods to represent system or task usability in a single metric do not include all the ANSI and ISO defined usability aspects: effectiveness, efficiency & satisfactio...
Jeff Sauro, Erika Kindlund
IEEEARES
2010
IEEE
15 years 12 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
132
Voted
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
15 years 12 months ago
Information Sharing at National Borders: Extending the Utility of Border Theory
Research has identified the potential and challenges of information sharing in government settings mostly within the context of a single country. The challenges facing inter-gover...
Celene Navarrete, Sehl Mellouli, Theresa A. Pardo,...
CRV
2009
IEEE
148views Robotics» more  CRV 2009»
15 years 12 months ago
A Novel Algorithm for Extraction of the Layers of the Cornea
Accurate corneal layer boundary extraction from optical coherence tomography can provide precise layer thickness measurements required in the analysis of corneal disease. This pap...
Justin A. Eichel, Akshaya Kumar Mishra, Paul W. Fi...
136
Voted
CSE
2009
IEEE
15 years 12 months ago
Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGs
Abstract—Gold farming refers to the illicit practice of gathering and selling virtual goods in online games for real money. Although around one million gold farmers engage in gol...
Muhammad Aurangzeb Ahmad, Brian Keegan, Jaideep Sr...
« Prev « First page 1129 / 1343 Last » Next »