Sciweavers

346 search results - page 32 / 70
» Can we trust docking results
Sort
View
IPPS
2007
IEEE
14 years 1 months ago
Evolution of Strategy Driven Behavior in Ad Hoc Networks Using a Genetic Algorithm
In this paper we address the problem of selfish behavior in ad hoc networks. We propose a strategy driven approach which aims at enforcing cooperation between network participant...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
INFSOF
2006
170views more  INFSOF 2006»
13 years 7 months ago
How large are software cost overruns? A review of the 1994 CHAOS report
: The Standish Group reported in 1994 that the average cost overrun of software projects was as high as 189%. This cost overrun number is used as input in recent governmental repor...
Magne Jørgensen, Kjetil Moløkken-&Os...
WMASH
2003
ACM
14 years 26 days ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
WIKIS
2009
ACM
14 years 8 days ago
Evaluating the trustworthiness of Wikipedia articles through quality and credibility
Wikipedia has become a very popular destination for Web surfers seeking knowledge about a wide variety of subjects. While it contains many helpful articles with accurate informati...
Sai T. Moturu, Huan Liu
PERCOM
2011
ACM
12 years 11 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri