Sciweavers

259 search results - page 13 / 52
» Metrics for Evaluating Database Selection Techniques
Sort
View
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
15 years 10 months ago
Authenticated join processing in outsourced databases
Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous aut...
Yin Yang, Dimitris Papadias, Stavros Papadopoulos,...
130
Voted
ICTAI
2010
IEEE
14 years 8 months ago
Support Vector Methods for Sentence Level Machine Translation Evaluation
Recent work in the field of machine translation (MT) evaluation suggests that sentence level evaluation based on machine learning (ML) can outperform the standard metrics such as B...
Antoine Veillard, Elvina Melissa, Cassandra Theodo...
85
Voted
CBSE
2005
Springer
15 years 3 months ago
Finding a Needle in the Haystack: A Technique for Ranking Matches Between Components
Abstract. Searching and subsequently selecting reusable components from component repositories has become a key impediment for not only component-based development but also for ach...
Naiyana Tansalarak, Kajal T. Claypool
83
Voted
BIOID
2008
130views Biometrics» more  BIOID 2008»
15 years 8 days ago
Quality-Based Score Normalization and Frame Selection for Video-Based Person Authentication
This paper addresses the incorporation of quality measures to video-based person authentication. A theoretical framework to incorporate quality measures in biometric authentication...
Enrique Argones-Rúa, José Luis Alba-...
DAC
1999
ACM
15 years 11 months ago
Behavioral Synthesis Techniques for Intellectual Property Protection
? The economic viability of the reusable core-based design paradigm depends on the development of techniques for intellectual property protection. We introduce the first dynamic wa...
Inki Hong, Miodrag Potkonjak