Sciweavers

2500 search results - page 373 / 500
» Specifying Behavior in C
Sort
View
108
Voted
MOBICOM
2004
ACM
15 years 9 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
MSWIM
2004
ACM
15 years 9 months ago
Quantile models for the threshold range for k-connectivity
This study addresses the problem of k-connectivity of a wireless multihop network consisting of randomly placed nodes with a common transmission range, by utilizing empirical regr...
Henri Koskinen
134
Voted
SIGDOC
2004
ACM
15 years 9 months ago
Automatic evaluation of aspects of document quality
Coh-Metrix is a web-based application currently in development that automatically evaluates text. It uses two central concepts from discourse processing: text-based cohesion and s...
David F. Dufty, Danielle S. McNamara, Max M. Louwe...
124
Voted
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 9 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
SIGECOM
2004
ACM
135views ECommerce» more  SIGECOM 2004»
15 years 9 months ago
Applying learning algorithms to preference elicitation
We consider the parallels between the preference elicitation problem in combinatorial auctions and the problem of learning an unknown function from learning theory. We show that l...
Sébastien Lahaie, David C. Parkes