Sciweavers

1186 search results - page 53 / 238
» On Designing an Experiment to Evaluate a Reverse Engineering...
Sort
View
LREC
2010
185views Education» more  LREC 2010»
14 years 11 months ago
Wikipedia and the Web of Confusable Entities: Experience from Entity Linking Query Creation for TAC 2009 Knowledge Base Populati
The Text Analysis Conference (TAC) is a series of Natural Language Processing evaluation workshops organized by the National Institute of Standards and Technology. The Knowledge B...
Heather Simpson, Stephanie Strassel, Robert Parker...
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 3 months ago
A Preliminary Model for Generating Experience Knowledge Based Artifacts
Inspections provide an effective way of acquiring and reusing experience knowledge. Several details, in both the inspection processes and the inspection event itself, can be found...
Jouni Kokkoniemi
AUIC
2006
IEEE
15 years 4 months ago
Generating mobile device user interfaces for diagram-based modelling tools
Mobile display devices such as phones and PDAs have become very widely available and used. However, most content on these devices is limited to text, static images and motion vide...
Dejin Zhao, John C. Grundy, John G. Hosking
HICSS
1999
IEEE
137views Biometrics» more  HICSS 1999»
15 years 2 months ago
A Methodology for Evaluating and Selecting Data Mining Software
As data mining evolves and matures more and more businesses are incorporating this technology into their business practices. However, currently data mining and decision support so...
Ken W. Collier, Donald Sautter, Curt Marjaniemi, B...
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 4 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...