Sciweavers

404 search results - page 46 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
174
Voted
IHI
2010
124views Healthcare» more  IHI 2010»
14 years 10 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
146
Voted
NGC
2000
Springer
125views Communications» more  NGC 2000»
15 years 7 months ago
A multicast-based protocol for IP mobility support
Several architectures have been recently proposed to support IP mobility. Most studies, however, show that current protocols, in general, fall short from satisfying the performanc...
Ahmed Helmy
123
Voted
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 4 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
128
Voted
ENTCS
2006
117views more  ENTCS 2006»
15 years 3 months ago
A Formalization of Credit and Responsibility Within the GNDC Schema
We formally define a notion of credit and responsibility within the Generalized Non Deducibility on Compositions framework. We investigate the validity of our definitions through ...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
MOBIWAC
2009
ACM
15 years 8 months ago
Adaptive, direction-aware data dissemination for diverse sensor mobility
We consider sensor networks where the sensor nodes are attached on entities that move in a highly dynamic, heterogeneous manner. To capture this mobility diversity we introduce a ...
Azzedine Boukerche, Dionysios Efstathiou, Sotiris ...