Sciweavers

140 search results - page 2 / 28
» P3
Sort
View
ICOIN
2007
Springer
13 years 10 months ago
Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution
Construction of overlay networks without any consideration of real network topologies causes inefficient routing in peer-to-peer networks. This paper presents the design and evalua...
Kunwoo Park, Sangheon Pack, Taekyoung Kwon
JCP
2007
148views more  JCP 2007»
13 years 4 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy
CSCW
2004
ACM
13 years 4 months ago
People-to-People-to-Geographical-Places: The P3 Framework for Location-Based Community Systems
Abstract. In this paper we examine an emerging class of systems that link People-to-People-toGeographical-Places; we call these P3-Systems. Through analyzing the literature, we hav...
Quentin Jones, Sukeshini A. Grandhi, Loren G. Terv...
TPDS
2002
126views more  TPDS 2002»
13 years 4 months ago
P-3PC: A Point-to-Point Communication Model for Automatic and Optimal Decomposition of Regular Domain Problems
One of the most fundamental problems automatic parallelization tools are confronted with is to find an optimal domain decomposition for a given application. For regular domain prob...
Frank J. Seinstra, Dennis Koelma
PET
2007
Springer
13 years 10 months ago
Enforcing P3P Policies Using a Digital Rights Management System
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that prote...
Farzad Salim, Nicholas Paul Sheppard, Reihaneh Saf...