Sciweavers

981 search results - page 150 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
ICDM
2007
IEEE
104views Data Mining» more  ICDM 2007»
15 years 5 months ago
Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases
Privacy-preserving data mining (PPDM) techniques aim to construct efficient data mining algorithms while maintaining privacy. Statistical disclosure limitation (SDL) techniques a...
Aleksandra B. Slavkovic, Yuval Nardi, Matthew M. T...
ICA3PP
2007
Springer
15 years 5 months ago
RSM-Based Gossip on P2P Network
Classification is a kind of basic semantics that people often use to manage versatile contents in daily life. Resource Space Model (RSM) is a semantic model for sharing and managin...
Hai Zhuge, Xiang Li
CONEXT
2006
ACM
15 years 5 months ago
Compositional control of IP media
Abstract— In many IP media services, the media channels are point-to-point, dynamic, and set up with the participation of one or more application servers, even though the media p...
Pamela Zave, Eric Cheung
VALUETOOLS
2006
ACM
149views Hardware» more  VALUETOOLS 2006»
15 years 5 months ago
Tail asymptotics for discrete event systems
In the context of communication networks, the framework of stochastic event graphs allows a modeling of control mechanisms induced by the communication protocol and an analysis of ...
Marc Lelarge
ISCC
2003
IEEE
15 years 4 months ago
DCMC - Delay-Constrained Multipoint Communication with Multiple Sources
Multipoint communication — simultaneous transmission from multiple sources to a group of receivers — has numerous applications on Internet. However, the problem is mainly stud...
Ayse Karaman, Hossam S. Hassanein