Sciweavers

2006 search results - page 350 / 402
» MUC-5 evaluation metrics
Sort
View
TKDE
2010
158views more  TKDE 2010»
13 years 7 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...
TON
2010
300views more  TON 2010»
13 years 7 months ago
POPI: a user-level tool for inferring router packet forwarding priority
— Packet forwarding prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of networ...
Guohan Lu, Yan Chen, Stefan Birrer, Fabián ...
VTC
2010
IEEE
177views Communications» more  VTC 2010»
13 years 7 months ago
Randomized Robot-Assisted Relocation of Sensors for Coverage Repair in Wireless Sensor Networks
—In wireless sensor networks (WSN), stochastic node dropping and unpredictable node failure greatly impair coverage, creating sensing holes, while locally redundant sensors exist...
Greg Fletcher, Xu Li, Amiya Nayak, Ivan Stojmenovi...
WCRE
2010
IEEE
13 years 7 months ago
Visually Supporting Source Code Changes Integration: The Torch Dashboard
—Automatic and advanced merging algorithms help programmers to merge their modifications in main development repositories. However, there is little support to help release maste...
Veroonica Uquillas Gomez, Stéphane Ducasse,...
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
13 years 6 months ago
Application-Aware diagnosis of runtime hardware faults
Extreme technology scaling in silicon devices drastically affects reliability, particularly because of runtime failures induced by transistor wearout. Currently available online t...
Andrea Pellegrini, Valeria Bertacco