Sciweavers

1551 search results - page 67 / 156
» Privacy-Preserving Network Aggregation
Sort
View
147 views 128 votes 15 years 7 months ago  RAID 2001»
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
116 views 116 votes 15 years 9 months ago  TRIDENTCOM 2008»
The WiMAX Reference Network Architecture can be used in point-to-point and point-to-multipoint network topologies, and is suitable for providing last-mile, building-to-building, a...
112 views 108 votes 15 years 8 months ago  WMCSA 2002»
MOPED (MObile grouPEd Device) is a network model that treats a user’s set of personal devices as a single, virtual device. The nodes of the MOPED dynamically aggregate available...
113 views 110 votes 15 years 7 months ago  GI 2001»
Abstract: This paper presents the information aggregation methods enabling cost- and QoS-aware service deployment. It is expected that network management tools will require the net...
153 views 127 votes 15 years 4 months ago  SNPD 2008»
Peer-to-Peer file sharing applications, which enable peers to establish multiple TCP connections between other peers to transfer data, pose new challenge to congestion control. Si...
124 views 123 votes 15 years 8 months ago  DEXA 2005»
Computing aggregates over distributed data sets constitutes an interesting class of distributed queries. Recent advances in peer-to-peer discovery of data sources and query process...
116 views 109 votes 15 years 5 months ago  NSDI 2007»
Blogs and RSS feeds are becoming increasingly popular. The blogging site LiveJournal has over 11 million user accounts,
188 views 150 votes 15 years 7 months ago  WCNC 2010»
—Enabling users to connect to the best available network, dynamic network selection scheme is important for satisfying various quality of service (QoS) requirements, achieving se...
141 views 152 votes 15 years 9 months ago  HICSS 2007»
Abstract— Social decision support systems are able to aggregate the local perspectives of a diverse group of individuals into a global social decision. This paper presents a mult...
219 views 135 votes 15 years 3 months ago  CCS 2010»
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...