Sciweavers

TKDE
2010
158views more  TKDE 2010»
13 years 2 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...
RECSYS
2010
ACM
13 years 2 months ago
RECON: a reciprocal recommender for online dating
The reciprocal recommender is a class of recommender system that is important for several tasks where people are both the subjects and objects of the recommendation. Some examples...
Luiz Augusto Sangoi Pizzato, Tomek Rej, Thomas Chu...
NAS
2010
IEEE
13 years 2 months ago
Efficient Route Discovery Algorithm for MANETs
Blocking-ERS is an energy efficient route discovery algorithm for MANETs. It uses chase packets to improve the route request process. In Blocking-ERS, most of the time the fulfill...
Mznah Al-Rodhaan, Abdullah Al-Dhelaan
CORR
2010
Springer
168views Education» more  CORR 2010»
13 years 4 months ago
Fault Tolerant Wireless Sensor MAC Protocol for Efficient Collision Avoidance
In sensor networks communication by broadcast methods involves many hazards, especially collision. Several MAC layer protocols have been proposed to resolve the problem of collisi...
Abhishek Samanta, Dripto Bakshi
GECCO
2008
Springer
129views Optimization» more  GECCO 2008»
13 years 5 months ago
Exploiting the path of least resistance in evolution
Hereditary Repulsion (HR) is a selection method coupled with a fitness constraint that substantially improves the performance and consistency of evolutionary algorithms. This als...
Gearoid Murphy, Conor Ryan
NLP
2000
13 years 8 months ago
Enhancing Preference-Based Anaphora Resolution with Genetic Algorithms
Abstract. The paper argues that a promising way to improve the success rate of preference-based anaphora resolution algorithms is the use of machine learning. The paper outlines MA...
Constantin Orasan, Richard Evans, Ruslan Mitkov
HICSS
2003
IEEE
201views Biometrics» more  HICSS 2003»
13 years 9 months ago
Critical Success Factors of Enterprise Resource Planning Systems Implementation Success in China
ERP implementation issues have been given much attention since two decades ago due to its low implementation success. Nearly 90 percent of ERP implementations are late or over bud...
Liang Zhang, Matthew K. O. Lee, Zhe Zhang, Probir ...
MLMI
2005
Springer
13 years 10 months ago
Dominance Detection in Meetings Using Easily Obtainable Features
We show that, using a Support Vector Machine classifier, it is possible to determine with a 75% success rate who dominated a particular meeting on the basis of a few basic feature...
Rutger Rienks, Dirk Heylen
IPPS
2007
IEEE
13 years 10 months ago
Replication Strategy in Unstructured Peer-to-Peer Systems
1 The unstructured Peer-to-Peer (P2P) systems usually use a “blind search” method to find the requested data object by propagating a query to a number of peers randomly. In or...
Guofu Feng, Yuquan Jiang, Guihai Chen, Qing Gu, Sa...
SOUPS
2009
ACM
13 years 11 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi