Sciweavers

1551 search results - page 20 / 156
» Privacy-Preserving Network Aggregation
Sort
View
79 views 98 votes 15 years 9 months ago  SASO 2007»
Current aggregation systems either have a single inbuilt aggregation mechanism or require applications to specify an aggregation policy a priori. It is hard to predict the read an...
103 views 134 votes 16 years 2 months ago  PERCOM 2006»
In this paper, we propose a new model of resilient data aggregation in sensor networks, where the aggregator analyzes the received sensor readings and tries to detect unexpected d...
181 views 140 votes 15 years 28 days ago  MASS 2010»
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
324 views 244 votes 14 years 10 months ago  PVLDB 2011»
With the recent surge of social networks such as Facebook, new forms of recommendations have become possible – recommendations that rely on one’s social connections in order t...
153 views 139 votes 15 years 3 months ago  CORR 2008»
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
126 views 121 votes 16 years 2 months ago  EWSN 2007»
172 views 123 votes 15 years 1 months ago  VTC 2010»
— The importance of characterizing the aggregate interference power generated by a wireless network has increased with the emergence of different types of wireless networks such ...
264 views 135 votes 15 years 9 months ago  AISADM 2007»
Peer-to-Peer (P2P) networks are gaining increasing popularity in many distributed applications such as file-sharing, network storage, web caching, searching and indexing of releva...
162 views 124 votes 15 years 9 months ago  CCS 2007»
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
140 views 130 votes 15 years 4 months ago  NETWORKING 2007»
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...