Sciweavers

1080 search results - page 49 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ENTCS
2006
173views more  ENTCS 2006»
14 years 10 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
IJNSEC
2007
121views more  IJNSEC 2007»
14 years 10 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
CSCWD
2008
Springer
14 years 12 months ago
Development of a project level performance measurement model for improving collaborative design team work
This research explored a new direction of improving collaborative design by performance measurement. More specifically, a novel 3-dimensional performance measurement model is deve...
Yuanyuan Yin, Shengfeng Qin, Ray Holland
KDD
2010
ACM
289views Data Mining» more  KDD 2010»
14 years 8 months ago
Exploitation and exploration in a performance based contextual advertising system
The dynamic marketplace in online advertising calls for ranking systems that are optimized to consistently promote and capitalize better performing ads. The streaming nature of on...
Wei Li 0010, Xuerui Wang, Ruofei Zhang, Ying Cui, ...
BMCBI
2004
97views more  BMCBI 2004»
14 years 10 months ago
Performance of a genetic algorithm for mass spectrometry proteomics
Background: Recently, mass spectrometry data have been mined using a genetic algorithm to produce discriminatory models that distinguish healthy individuals from those with cancer...
Neal O. Jeffries