Sciweavers

1551 search results - page 131 / 156
» Privacy-Preserving Network Aggregation
Sort
View
117 views 133 votes 15 years 9 months ago  MDM 2005»
In this paper we propose a query-driven approach for tuning the time/energy trade-off in sensor networks with mobile sensors. The tuning factors include re-positioning of mobile s...
130 views 128 votes 15 years 8 months ago  ICNP 2002»
This paper describes the main ideas of DRMTP (Distributed Real-time Multicast Transport Protocol), an adaptive application-level protocol which allows cooperative multicast of rea...
76 views 102 votes 15 years 7 months ago  APNOMS 2006»
In a large-scale backbone networks, the traffic monitoring system needs to receive a large volume of flow records, so if a single central collecting process is used, it might not b...
194 views 121 votes 15 years 6 months ago  AAAI 2008»
One of the core goals of the Semantic Web is to store data in distributed locations, and use ontologies and reasoning to aggregate it. Social networking is a large movement on the...
302 views 137 votes 15 years 3 months ago  NETWORK 2006»
The large-scale deployment of wireless sensor networks (WSNs) and the need for data aggregation necessitate efficient organization of the network topology for the purpose of balan...
146 views 143 votes 15 years 3 months ago  PVLDB 2008»
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
105 views 101 votes 15 years 10 months ago  IROS 2007»
— We are motivated by the prospect of automating microbial observing systems. To this end we have designed and built a robotic boat as part of a sensor network for monitoring aqu...
182 views 128 votes 15 years 3 months ago  SIGCOMM 2010»
We introduce and motivate crowd computing, which combines mobile devices and social interactions to achieve large-scale distributed computation. An opportunistic network of mobile...
80 views 143 votes 15 years 8 months ago  CCS 1999»
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speci...
297 views 157 votes 14 years 6 months ago  SIGMOD 2011»
We consider extending decision support facilities toward large sophisticated networks, upon which multidimensional attributes are associated with network entities, thereby forming...