Sciweavers

1551 search results - page 75 / 156
» Privacy-Preserving Network Aggregation
Sort
View
98 views 131 votes 14 years 6 months ago  FTDB 2011»
We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithm...
110 views 140 votes 15 years 8 months ago  AINA 2003»
The use of mobile applications is increasing rapidly. Particularly, mobile applications for decision support systems, such as mobile datawarehouses, are very attractive. However, ...
150 views 137 votes 15 years 1 months ago  TMA 2010»
One-way packet delay is an important network performance metric. Recently, a new data structure called Lossy Difference Aggregator (LDA) has been proposed to estimate this metric m...
264 views 194 votes 15 years 1 months ago  WAOA 2010»
We study flows over time in networks with transit times on the arcs. Transit times describe how long it takes to traverse an arc. A flow over time specifies for each arc a time-dep...
150 views 145 votes 15 years 5 months ago  CCS 2008»
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
117 views 112 votes 15 years 4 months ago  UAI 2001»
We consider the task of aggregating beliefs of several experts. We assume that these beliefs are represented as probability distributions. We argue that the evaluation of any aggr...
106 views 161 votes 15 years 4 months ago  DAIS 2009»
Data aggregation plays an important role in the design of scalable systems, allowing the determination of meaningful system-wide properties to direct the execution of distributed a...
143 views 136 votes 15 years 9 months ago  CLUSTER 2008»
Abstract—In addition to its use in local area networks, Ethernet has been used for connecting hosts in the area of highperformance computing. Here, we investigated the impact of ...
128 views 113 votes 15 years 9 months ago  INFOCOM 2007»
— We consider the problem of aggregating data at a mobile fusion center (fusor) (eg. a PDA or a cellular phone) moving within a spatial region over which a wireless sensor networ...
125 views 128 votes 15 years 9 months ago  SIGCOMM 2009»
Many network applications have stringent end-to-end latency requirements, including VoIP and interactive video conferencing, automated trading, and high-performance computing—wh...