Sciweavers

4886 search results - page 31 / 978
» Approximate Data Exchange
Sort
View
ICDM
2005
IEEE
139views Data Mining» more  ICDM 2005»
15 years 9 months ago
Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation
In order to generate synthetic basket data sets for better benchmark testing, it is important to integrate characteristics from real-life databases into the synthetic basket data ...
Yongge Wang, Xintao Wu
INFOCOM
2006
IEEE
15 years 10 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
143
Voted
JMS
2010
139views more  JMS 2010»
15 years 2 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
TWC
2010
14 years 10 months ago
Bandwidth exchange: an energy conserving incentive mechanism for cooperation
Cooperative forwarding in wireless networks has shown to yield rate and diversity gains, but it incurs energy costs borne by the cooperating nodes. In this paper we consider an inc...
Dan Zhang, Ryoichi Shinkuma, Narayan B. Mandayam
111
Voted
CI
2004
76views more  CI 2004»
15 years 4 months ago
Negotiating Exchanges of P3p-Labeled Information for Compensation
We consider private information a commodity, of value to both the information holder and the information seeker. Hence, a customer can be enticed to trade his/her private informati...
Scott Buffett, Keping Jia, Sandy Liu, Bruce Spence...