Sciweavers

1551 search results - page 74 / 156
» Privacy-Preserving Network Aggregation
Sort
View
113 views 138 votes 15 years 3 months ago  CCR 2004»
Peer-to-peer (P2P) networks represent an effective way to share information, since there are no central points of failure or bottleneck. However, the flip side to the distributive...
81 views 108 votes 15 years 3 months ago  JNW 2008»
This paper studies the effect of rerouting for augmenting aggregate based resource allocation in the trade-off between overhead and utilization. Aggregation is a common approach us...
101 views 101 votes 16 years 4 months ago  ICIP 1997»
MPEG, the Mowing Picture Experts Group, is a popular compression standard used in many multimedia applications. In video distribution systems, a CBR communications channel is ofte...
98 views 132 votes 15 years 10 months ago  AINA 2009»
Sensing context information and making it available to the people, involved in coordinating a collaborative task, is a preliminary phase in making a system adaptable to the prevai...
165 views 129 votes 15 years 8 months ago  OTM 2005»
Abstract. A significant increase in real world event monitoring capability with wireless sensor networks brought a new challenge to ubiquitous computing. To manage high volume and...
98 views 131 votes 14 years 6 months ago  FTDB 2011»
We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithm...
110 views 140 votes 15 years 8 months ago  AINA 2003»
The use of mobile applications is increasing rapidly. Particularly, mobile applications for decision support systems, such as mobile datawarehouses, are very attractive. However, ...
150 views 137 votes 15 years 1 months ago  TMA 2010»
One-way packet delay is an important network performance metric. Recently, a new data structure called Lossy Difference Aggregator (LDA) has been proposed to estimate this metric m...
264 views 194 votes 15 years 1 months ago  WAOA 2010»
We study flows over time in networks with transit times on the arcs. Transit times describe how long it takes to traverse an arc. A flow over time specifies for each arc a time-dep...
150 views 145 votes 15 years 5 months ago  CCS 2008»
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...