Sciweavers

17 search results - page 4 / 4
» Analysis of the security of linear blinding techniques from ...
Sort
View
INFOCOM
2012
IEEE
11 years 8 months ago
Memory-assisted universal compression of network flows
—Recently, the existence of considerable amount of redundancy in the Internet traffic has stimulated the deployment of several redundancy elimination techniques within the netwo...
Mohsen Sardari, Ahmad Beirami, Faramarz Fekri
ISI
2008
Springer
13 years 5 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh