Sciweavers

346 search results - page 14 / 70
» Can we trust docking results
Sort
View
ACMSE
2004
ACM
15 years 11 months ago
Trustworthiness in e-commerce
Usability has often been sold as the silver bullet for solving the problems of unprofitable online stores. Although better usability will generally improve these sites and their p...
Patricia Lanford, Roland Hübscher
VLDB
2004
ACM
95views Database» more  VLDB 2004»
15 years 10 months ago
Combating Web Spam with TrustRank
Web spam pages use various techniques to achieve higher-than-deserved rankings in a search engine’s results. While human experts can identify spam, it is too expensive to manual...
Zoltán Gyöngyi, Hector Garcia-Molina, ...
SRDS
2007
IEEE
15 years 11 months ago
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
We are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are...
Vishal Kher, Yongdae Kim
WISEC
2010
ACM
16 years 14 days ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
ICECCS
1999
IEEE
83views Hardware» more  ICECCS 1999»
15 years 9 months ago
A Framework for Analyzing Configurations of Deployable Software Systems
Configuring and deploying a large software system is complicated when the system is composed of components and when there are numerous possible configurations for the system. In s...
Dennis Heimbigner, Richard S. Hall, Alexander L. W...