Sciweavers

4051 search results - page 255 / 811
» Aggregation
Sort
View
PVLDB
2008
116views more  PVLDB 2008»
15 years 3 months ago
Anonymizing bipartite graph data using safe groupings
Private data often comes in the form of associations between entities, such as customers and products bought from a pharmacy, which are naturally represented in the form of a larg...
Graham Cormode, Divesh Srivastava, Ting Yu, Qing Z...
TSC
2008
140views more  TSC 2008»
15 years 3 months ago
Dynamic Web Service Selection for Reliable Web Service Composition
This paper studies the dynamic Web service selection problem in a failure-prone environment, which aims to determine a subset of Web services to be invoked at runtime so as to succ...
San-Yih Hwang, Ee-Peng Lim, Chien-Hsiang Lee, Chen...
133
Voted
ITIIS
2010
94views more  ITIIS 2010»
15 years 2 months ago
AFSO: An Adaptative Frame Size Optimization Mechanism for 802.11 Networks
In this paper, we analyze the impact of different frame types on self-similarity and burstiness characteristics of the aggregated frame traffic from a real 802.11 wireless local a...
Xiaohu Ge, Cheng-Xiang Wang, Yang Yang, Lei Shu, C...
PVLDB
2010
93views more  PVLDB 2010»
15 years 2 months ago
Distributed Threshold Querying of General Functions by a Difference of Monotonic Representation
The goal of a threshold query is to detect all objects whose score exceeds a given threshold. This type of query is used in many settings, such as data mining, event triggering, a...
Guy Sagy, Daniel Keren, Izchak Sharfman, Assaf Sch...
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
15 years 2 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero