Sciweavers

2008 search results - page 368 / 402
» MUC-4 evaluation metrics
Sort
View
FC
2006
Springer
108views Cryptology» more  FC 2006»
13 years 11 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
JOBIM
2000
13 years 11 months ago
Can We Have Confidence in a Tree Representation?
Abstract. A tree representation distance method, applied to any dissimilarity array, always gives a valued tree, even if the tree model is not appropriate. In the first part, we pr...
Alain Guénoche, Henri Garreta
SIGMOD
1995
ACM
148views Database» more  SIGMOD 1995»
13 years 11 months ago
Copy Detection Mechanisms for Digital Documents
In a digital library system, documents are available in digital form and therefore are more easily copied and their copyrights are more easily violated. This is a very serious pro...
Sergey Brin, James Davis, Hector Garcia-Molina
SIGMETRICS
1991
ACM
13 years 11 months ago
Implementing Stack Simulation for Highly-Associative Memories
Prior to this work, all implementations of stack simulation [MGS70] required more than linear time to process an address trace. In particular these implementations are often slow ...
Yul H. Kim, Mark D. Hill, David A. Wood
AINA
2009
IEEE
13 years 10 months ago
Benchmarking Latency Effects on Mobility Tracking in WSNs
The number of active nodes in a WSN deployment governs both the longevity of the network and the accuracy of applications using the network's data. As node hibernation techni...
Richard Tynan, Michael J. O'Grady, Gregory M. P. O...