Sciweavers

5638 search results - page 1107 / 1128
» On presence
Sort
View
IPM
2011
118views more  IPM 2011»
13 years 2 months ago
Detecting spam blogs from blog search results
Blogging has been an emerging media for people to express themselves. However, the presence of spam-blogs (also known as splogs) may reduce the value of blogs and blog search engi...
Linhong Zhu, Aixin Sun, Byron Choi
MTA
2011
220views Hardware» more  MTA 2011»
13 years 2 months ago
Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration
: With the advances in a variety of software/hardware technologies and wireless networking, there is coming a need for ubiquitous collaboration which allows people to access inform...
Kangseok Kim, Geoffrey C. Fox
NC
2011
232views Neural Networks» more  NC 2011»
13 years 2 months ago
The effect of malformed tiles on tile assemblies within the kinetic tile assembly model
Many different constructions of proofreading tile sets have been proposed in the literature to reduce the effect of deviations from ideal behaviour of the dynamics of the molecular...
Ya Meng, Navin Kashyap
SIAMCOMP
2011
13 years 2 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...
TDSC
2011
13 years 2 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
« Prev « First page 1107 / 1128 Last » Next »