In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Empirical studies are crucial to gain evidence on the effects of software engineering methods and tools in defined contexts. However, empirical studies can be costly and thus need...
Background: Numerous feature selection methods have been applied to the identification of differentially expressed genes in microarray data. These include simple fold change, clas...
: Although instant messaging is a very popular tool for collaboration and it has been used for a wide variety of CSCL tasks, there are only a few applications for assisting the tut...
Mihai Dascalu, Erol-Valeriu Chioasca, Stefan Traus...
The project goal was to loosely couple the SWAT model and the QUAL2E model and compare their combined ability to predict total phosphorus (TP) and NO3-N plus NO2-N yields to the a...