Sciweavers

236 search results - page 2 / 48
» Can You Trust Software Capability Evaluations
Sort
View
JCC
2011
154views more  JCC 2011»
13 years 1 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
CHI
2009
ACM
14 years 5 months ago
O' game, can you feel my frustration?: improving user's gaming experience via stresscam
One of the major challenges of video game design is to have appropriate difficulty levels for users in order to maximize the entertainment value of the game. Game players may lose...
Chang Yun, Dvijesh Shastri, Ioannis Pavlidis, Zhig...
SAC
2009
ACM
14 years 5 months ago
A personalized framework for trust assessment
The number of computational trust models has been increasing rapidly in recent years, yet their applications for automating trust evaluation are still limited. The main obstacle i...
Trung Dong Huynh
VLDB
2007
ACM
106views Database» more  VLDB 2007»
14 years 5 months ago
Why You Should Run TPC-DS: A Workload Analysis
The Transaction Processing Performance Council (TPC) is completing development of TPC-DS, a new generation industry standard decision support benchmark. The TPC-DS benchmark, firs...
Meikel Pöss, Raghunath Othayoth Nambiar, Davi...
SEC
2004
14 years 7 days ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi