Sciweavers

2006 search results - page 370 / 402
» MUC-5 evaluation metrics
Sort
View
DCOSS
2006
Springer
14 years 15 days ago
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...
Yawen Wei, Zhen Yu, Yong Guan
ER
2006
Springer
123views Database» more  ER 2006»
14 years 15 days ago
A Quantitative Summary of XML Structures
Statistical summaries in relational databases mainly focus on the distribution of data values and have been found useful for various applications, such as query evaluation and data...
Zi Lin, Bingsheng He, Byron Choi
FC
2006
Springer
108views Cryptology» more  FC 2006»
14 years 14 days ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
JOBIM
2000
14 years 12 days ago
Can We Have Confidence in a Tree Representation?
Abstract. A tree representation distance method, applied to any dissimilarity array, always gives a valued tree, even if the tree model is not appropriate. In the first part, we pr...
Alain Guénoche, Henri Garreta
SIGMOD
1995
ACM
148views Database» more  SIGMOD 1995»
14 years 11 days ago
Copy Detection Mechanisms for Digital Documents
In a digital library system, documents are available in digital form and therefore are more easily copied and their copyrights are more easily violated. This is a very serious pro...
Sergey Brin, James Davis, Hector Garcia-Molina