Sciweavers

1551 search results - page 60 / 156
» Privacy-Preserving Network Aggregation
Sort
View
163 views 143 votes 15 years 9 months ago  IPPS 2006»
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
95 views 91 votes 15 years 9 months ago  IEEEARES 2007»
The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies — ...
113 views 102 votes 16 years 3 months ago  OSDI 2002»
128 views 134 votes 15 years 3 months ago  IJAHUC 2006»
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
92 views 109 votes 15 years 4 months ago  IJCAI 2003»
We present a coherent framework for data clustering. Starting with a Hopfield network, we show the solutions for several well-motivated clustering objective functions are principa...
167 views 145 votes 15 years 5 months ago  CDC 2008»
The problem of regulating air traffic in the en route airspace of the National Airspace System is studied using an Eulerian network model to describe air traffic flow. The evolutio...
202 views 248 votes 16 years 4 months ago  GIS 2008»
Wireless sensor networks (WSNs) can provide real-time information about geospatial environments, and so have the potential to play an important role in the monitoring of geographi...
109 views 106 votes 15 years 8 months ago  HICSS 2002»
We analyze alternative market designs for a multisettlement system for electricity in which the resolution of the transmission network model is increased as time approaches real-t...
98 views 127 votes 15 years 8 months ago  INFOCOM 2002»
In this paper we study the Optical Burst Switching (OBS) paradigm for the support of the TCP flows in an All Optical Network (AON). We analyze the TCP send rate, i.e. the amount of...
92 views 97 votes 15 years 3 months ago  CCR 2002»
The current Internet infrastructure has very few built-in protection mechanisms and is therefore vulnerable to attacks and failures. In particular, recent events have illustrated ...