Sciweavers

346 search results - page 16 / 70
» Can we trust docking results
Sort
View
IWNAS
2008
IEEE
14 years 2 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
WWW
2010
ACM
14 years 2 months ago
SourceRank: relevance and trust assessment for deep web sources based on inter-source agreement
We consider the problem of deep web source selection and argue that existing source selection methods are inadequate as they are based on local similarity assessment. Specificall...
Raju Balakrishnan, Subbarao Kambhampati
ICIP
2006
IEEE
14 years 9 months ago
QP_TR Trust Region Blob Tracking Through Scale-Space
A new approach of tracking objects in image sequences is proposed, in which the constant changes of the size and orientation ofthe target can be precisely described. For each inco...
Jingping Jia, Qing Wang, Yanmei Chai, Rongchun Zha...
HPCC
2007
Springer
14 years 1 months ago
Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
Qiang Zhang, Guangming Hu, Zhenghu Gong
EWCBR
2008
Springer
13 years 9 months ago
Provenance, Trust, and Sharing in Peer-to-Peer Case-Based Web Search
Despite the success of modern Web search engines, challenges remain when it comes to providing people with access to the right information at the right time. In this paper, we desc...
Peter Briggs, Barry Smyth