Sciweavers

346 search results - page 35 / 70
» Can we trust docking results
Sort
View
CEC
2005
IEEE
14 years 1 months ago
The emergence of cooperation among agents using simple fixed bias tagging
AbstractThe principle of cooperation influences our everyday lives. This conflict between individual and collective rationality can be modelled through the use of social dilemmas...
Enda Howley, Colm O'Riordan
ACSAC
2004
IEEE
13 years 11 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 7 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
ACSC
2008
IEEE
14 years 2 months ago
Relative simulation and model checking of real-time processes
Simulation and model checking are commonly used to compare the behaviour of a computer-based system with its requirements specification. However, when upgrading an operational le...
Colin J. Fidge
DEBU
2007
211views more  DEBU 2007»
13 years 7 months ago
Provenance in Databases: Past, Current, and Future
The need to understand and manage provenance arises in almost every scientific application. In many cases, information about provenance constitutes the proof of correctness of re...
Wang Chiew Tan