Sciweavers

4051 search results - page 98 / 811
» Aggregation
Sort
View
80
Voted
ESORICS
2007
Springer
15 years 6 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
82
Voted
CEC
2005
IEEE
15 years 6 months ago
Performance of aggregation pheromone system on unimodal and multimodal problems
This paper describes and analyzes the aggregation pheromone system (APS) algorithm, which extends ant colony optimization (ACO) to continuous domains. APS uses the collective behav...
Shigeyoshi Tsutsui, Martin Pelikan, Ashish Ghosh
92
Voted
HICSS
2005
IEEE
132views Biometrics» more  HICSS 2005»
15 years 6 months ago
NusEye: Visualizing Network Structure to Support Navigation of Aggregated Content
The application of social network analysis techniques, along with graph visualization and interaction, for navigating syndicated web content, a.k.a webfeeds, is presented. Within ...
Brian M. Dennis, Azzari Caillier Jarrett
58
Voted
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Aggregating signatures of MPEG-4 elementary streams
A complete MPEG-4 stream consists of many elementary streams which may be generated by different authors. In the scenario of this paper, each author signs his own authentic elemen...
Yongdong Wu
99
Voted
SEFM
2005
IEEE
15 years 6 months ago
Safe Concurrency for Aggregate Objects with Invariants
Developing safe multithreaded software systems is difficult due to the potential unwanted interference among concurrent threads. This paper presents a flexible methodology for o...
Bart Jacobs 0002, Frank Piessens, K. Rustan M. Lei...