Sciweavers

1647 search results - page 38 / 330
» Distributing private data in challenged network environments
Sort
View
141
Voted
NDSS
1998
IEEE
15 years 9 months ago
Distributed Algorithms for Attack Localization in All-Optical Networks
All-Optical Networks provide ultra-fast data rates, but present a new set of challenges for network security. We present a new algorithm for attack localization in networks. The a...
Ruth Bergman, Muriel Médard, Serena Chan
FGCS
2006
111views more  FGCS 2006»
15 years 5 months ago
Collaborative data visualization for Earth Sciences with the OptIPuter
Collaborative visualization of large-scale datasets across geographically distributed sites is becoming increasingly important for Earth Sciences. Not only does it enhance our und...
Nut Taesombut, Xinran (Ryan) Wu, Andrew A. Chien, ...
197
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 7 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
156
Voted
INFOSCALE
2006
ACM
15 years 11 months ago
PENS: an algorithm for density-based clustering in peer-to-peer systems
Huge amounts of data are available in large-scale networks of autonomous data sources dispersed over a wide area. Data mining is an essential technology for obtaining hidden and v...
Mei Li, Guanling Lee, Wang-Chien Lee, Anand Sivasu...
CCS
2009
ACM
16 years 4 days ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...