Sciweavers

346 search results - page 47 / 70
» Can we trust docking results
Sort
View
AINA
2006
IEEE
14 years 1 months ago
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks
Design of protocols for mobile ad-hoc networks (MANETs) is generally tricky compared to wired networks, because on the one hand the increased communication constraints given by th...
Lijun Liao, Mark Manulis
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 7 months ago
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits
Abstract--We investigate the problem of maintaining an encoded distributed storage system when some nodes contain adversarial errors. Using the error-correction capabilities that a...
Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tr...
CICLING
2011
Springer
12 years 11 months ago
Wikipedia Vandalism Detection: Combining Natural Language, Metadata, and Reputation Features
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
B. Thomas Adler, Luca de Alfaro, Santiago Mois&eac...
HOTDEP
2008
107views Hardware» more  HOTDEP 2008»
13 years 10 months ago
Reverse-Engineering Drivers for Safety and Portability
Device drivers today lack two important properties: guaranteed safety and cross-platform portability. We present an approach to incrementally achieving these properties in drivers...
Vitaly Chipounov, George Candea
CIKM
2009
Springer
14 years 2 months ago
Exploiting bidirectional links: making spamming detection easier
Previous anti-spamming algorithms based on link structure suffer from either the weakness of the page value metric or the vagueness of the seed selection. In this paper, we propos...
Yan Zhang, Qiancheng Jiang, Lei Zhang, Yizhen Zhu