Sciweavers

4051 search results - page 517 / 811
» Aggregation
Sort
View
158
Voted
IEEEARES
2008
IEEE
15 years 11 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
IEEEIAS
2008
IEEE
15 years 11 months ago
Ensemble of One-Class Classifiers for Network Intrusion Detection System
To achieve high accuracy while lowering false alarm rates are major challenges in designing an intrusion detection system. In addressing this issue, this paper proposes an ensembl...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
INFOCOM
2008
IEEE
15 years 11 months ago
MPLOT: A Transport Protocol Exploiting Multipath Diversity Using Erasure Codes
—In this paper, we propose a novel transport protocol that effectively utilizes available bandwidth and diversity gains provided by heterogeneous, highly lossy paths. Our Multi-P...
Vicky Sharma, Shivkumar Kalyanaraman, Koushik Kar,...
INFOCOM
2008
IEEE
15 years 11 months ago
Wide-Area IP Network Mobility
—IP network mobility is emerging as a major paradigm for providing continuous Internet access while a set of users are on the move in a transportation system. The intense interes...
Xin Hu, Erran L. Li, Zhuoqing Morley Mao, Yang Ric...
IPPS
2008
IEEE
15 years 11 months ago
Absolute Slicing in Peer-to-peer Systems
Peer-to-peer (P2P) systems are slowly moving from application-specific architectures to a generic serviceoriented design framework. The idea is to allow a dynamic collection of P...
Alberto Montresor, Roberto Zandonati