Sciweavers

11580 search results - page 265 / 2316
» Communication vs. Computation
Sort
View
SDMW
2004
Springer
15 years 9 months ago
Experimental Analysis of Privacy-Preserving Statistics Computation
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqian...
CDC
2008
IEEE
149views Control Systems» more  CDC 2008»
15 years 6 months ago
Distributed computation under bit constraints
Abstract-- A network of nodes communicate via noisy channels. Each node has some real-valued initial measurement or message. The goal of each of the nodes is to acquire an estimate...
Ola Ayaso, Devavrat Shah, Munther A. Dahleh
COMSUR
2007
101views more  COMSUR 2007»
15 years 4 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
CORR
2010
Springer
90views Education» more  CORR 2010»
14 years 11 months ago
Multiparty Equality Function Computation in Networks with Point-to-Point Links
Abstract. In this paper, we study the problem of computing the multiparty equality (MEQ) function: n 2 nodes, each of which is given an input value from {1,
Guanfeng Liang, Nitin H. Vaidya
SIGMOD
2011
ACM
206views Database» more  SIGMOD 2011»
14 years 7 months ago
Sampling based algorithms for quantile computation in sensor networks
We study the problem of computing approximate quantiles in large-scale sensor networks communication-efficiently, a problem previously studied by Greenwald and Khana [12] and Shri...
Zengfeng Huang, Lu Wang, Ke Yi, Yunhao Liu