Sciweavers

1551 search results - page 88 / 156
» Privacy-Preserving Network Aggregation
Sort
View
235 views 234 votes 16 years 4 months ago  GIS 2007»
The development of areas such as remote and airborne sensing, location based services, and geosensor networks enables the collection of large volumes of spatial data. These datase...
149 views 146 votes 15 years 8 months ago  IPPS 2003»
ShareStreams (Scalable Hardware Architectures for Stream Schedulers) is a canonical architecture for realizing a range of scheduling disciplines. This paper discusses the design c...
147 views 127 votes 15 years 8 months ago  MM 2009»
While existing studies on YouTube’s massive user-generated video content have mostly focused on the analysis of videos, their characteristics, and network properties, little att...
114 views 141 votes 15 years 4 months ago  UAI 2007»
A research organization responds to a variety of customer requests. Each high level request is broken down into a set of low level requests. For each low level request, the resear...
150 views 113 votes 15 years 3 months ago  CORR 2007»
The rise of social media sites — blogs, wikis, and Digg — underscores the transformation of the Web to a participatory medium in which users are collaboratively creating, eval...
133 views 128 votes 15 years 3 months ago  CCR 2002»
We critically examine the claims that TCP congestion control contributes to the observed self-similar traffic rate correlations. A simulation model is designed to analyze aggregat...
187 views 107 votes 15 years 1 months ago  INFOCOM 2010»
Abstract—In many applications the traffic traversing the network has inter-packet dependencies due to application-level encoding schemes. For some applications, e.g., multimedia...
122 views 119 votes 15 years 8 months ago  SOFTCO 2004»
The computational identification of genes in DNA sequences has become an issue of crucial importance due to the large number of DNA molecules being currently sequenced. We present ...
143 views 127 votes 15 years 1 months ago  SCN 2010»
Aggregate message authentication codes, as introduced by Katz and Lindell (CT-RSA 2008), combine several MACs into a single value, which has roughly the same size as an ordinary MA...
75 views 131 votes 15 years 8 months ago  INFOCOM 2002»
Abstract— We consider stochastic guarantees for networks with aggregate scheduling, in particular, Expedited Forwarding (EF). Our approach on the assumption that a node can be ab...