Sciweavers

1022 search results - page 62 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
EISWT
2007
14 years 11 months ago
Evaluation Criteria for Self-Management in DBMSs
As computing systems continue to grow in size and complexity, the need for self-management is becoming more prevalent. The difficulty and cost associated with the maintenance of l...
Armando Barreto, Ben Wongsaroj, Tariq M. King, Tua...
CHI
2003
ACM
15 years 10 months ago
Recommending collaboration with social networks: a comparative evaluation
Studies of information seeking and workplace collaboration often find that social relationships are a strong factor in determining who collaborates with whom. Social networks prov...
David W. McDonald
TOCS
2002
70views more  TOCS 2002»
14 years 9 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
MM
2005
ACM
167views Multimedia» more  MM 2005»
15 years 3 months ago
Evaluation axes for medical image retrieval systems: the imageCLEF experience
Content–based image retrieval in the medical domain is an extremely hot topic in medical imaging as it promises to help better managing the large amount of medical images being ...
Henning Müller, Paul Clough, William R. Hersh...
DSN
2004
IEEE
15 years 1 months ago
Experience with Evaluating Human-Assisted Recovery Processes
We describe an approach to quantitatively evaluating human-assisted failure-recovery tools and processes in the environment of modern Internet- and enterprise-class server systems...
Aaron B. Brown, Leonard Chung, William Kakes, Calv...