Sciweavers

2006 search results - page 338 / 402
» MUC-5 evaluation metrics
Sort
View
MOBICOM
2003
ACM
14 years 2 months ago
Towards realistic mobility models for mobile ad hoc networks
One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. Simulation provides researchers with a number...
Amit P. Jardosh, Elizabeth M. Belding-Royer, Kevin...
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
14 years 2 months ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu
SIGIR
2003
ACM
14 years 2 months ago
Salton Award Lecture - Information retrieval and computer science: an evolving relationship
Following the tradition of these acceptance talks, I will be giving my thoughts on where our field is going. Any discussion of the future of information retrieval (IR) research, h...
W. Bruce Croft
CCS
2003
ACM
14 years 2 months ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
GECCO
2003
Springer
129views Optimization» more  GECCO 2003»
14 years 2 months ago
Inherent Fault Tolerance in Evolved Sorting Networks
This poster paper summarizes our research on fault tolerance arising as a by-product of the evolutionary computation process. Past research has shown evidence of robustness emergin...
Rob Shepherd, James A. Foster