Sciweavers

988 search results - page 116 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
SEMWEB
2009
Springer
15 years 4 months ago
Recommendations for Qualitative Ontology Matching Evaluations
This paper suggests appropriate rules to set up ontology matching evaluations and for golden standard construction and use which can significantly improve the quality of the preci...
Aliaksandr Autayeu, Vincenzo Maltese, Pierre Andre...
ESORICS
2007
Springer
15 years 4 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
ERLANG
2006
ACM
15 years 3 months ago
Testing telecoms software with quviq QuickCheck
We present a case study in which a novel testing tool, Quviq QuickCheck, is used to test an industrial implementation of the Megaco protocol. We considered positive and negative t...
Thomas Arts, John Hughes, Joakim Johansson, Ulf Wi...
SIGIR
2006
ACM
15 years 3 months ago
Improving the estimation of relevance models using large external corpora
Information retrieval algorithms leverage various collection statistics to improve performance. Because these statistics are often computed on a relatively small evaluation corpus...
Fernando Diaz, Donald Metzler
AMDO
2004
Springer
15 years 3 months ago
Recognition and Tracking of the Members of a Moving Human Body
We present a method to solve the human silhouette tracking problem using 18 major human points. We used: a simple 2D model for the human silhouette, a linear prediction technique f...
Costas Panagiotakis, Georgios Tziritas