Sciweavers

932 search results - page 167 / 187
» Empirical Studies of Quality Models in Object-Oriented Syste...
Sort
View
113
Voted
CCS
2010
ACM
14 years 11 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
87
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 7 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
105
Voted
MM
2009
ACM
206views Multimedia» more  MM 2009»
15 years 5 months ago
Adaptive, selective, automatic tonal enhancement of faces
This paper presents an efficient, personalizable and yet completely automatic algorithm for enhancing the brightness, tonal balance, and contrast of faces in thumbnails of online...
Hrishikesh Aradhye, George Toderici, Jay Yagnik
82
Voted
BMCBI
2006
94views more  BMCBI 2006»
15 years 15 days ago
Simulation of microarray data with realistic characteristics
Background: Microarray technologies have become common tools in biological research. As a result, a need for effective computational methods for data analysis has emerged. Numerou...
Matti Nykter, Tommi Aho, Miika Ahdesmäki, Pek...
101
Voted
KDD
2009
ACM
183views Data Mining» more  KDD 2009»
15 years 7 months ago
Financial incentives and the "performance of crowds"
The relationship between financial incentives and performance, long of interest to social scientists, has gained new relevance with the advent of web-based “crowd-sourcing” mo...
Winter A. Mason, Duncan J. Watts