Sciweavers

1551 search results - page 91 / 156
» Privacy-Preserving Network Aggregation
Sort
View
103 views 110 votes 15 years 3 months ago  CN 1999»
Inspired by the PNNI protocol of the ATM Forum, this work focuses on the problem of node aggregation within peer groups and link aggregation between peer groups. It is assumed tha...
156 views 247 votes 16 years 4 months ago  ICDE 2006»
Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events....
180 views 115 votes 15 years 3 months ago  CORR 2010»
Abstract. Aggregation is an important building block of modern distributed applications, allowing the determination of meaningful properties (e.g. network size, total storage capac...
110 views 122 votes 15 years 1 months ago  IPPS 2010»
Many high-performance tools, applications and infrastructures, such as Paradyn, STAT, TAU, Ganglia, SuperMon, Astrolabe, Borealis, and MRNet, use data aggregation to synthesize lar...
191 views 228 votes 16 years 3 months ago  SIGMOD 2008»
Graphs are widely used to model real world objects and their relationships, and large graph datasets are common in many application domains. To understand the underlying character...
219 views 126 votes 16 years 24 days ago  ICDT 2010»
Sources of data uncertainty and imprecision are numerous. A way to handle this uncertainty is to associate probabilistic annotations to data. Many such probabilistic database mode...
207 views 151 votes 15 years 9 months ago  MOBIQUITOUS 2008»
VESPA (Vehicular Event Sharing with a mobile P2P Architecture) 1 is a system for enabling vehicles to share information in vehicular ad-hoc networks (VANETs). The originality of V...
85 views 108 votes 15 years 8 months ago  HPDC 2002»
Peer-to-peer (P2P) computing grids consist of peer nodes that communicate directly among themselves through wide-area networks and can act as both clients and servers. These syste...
109 views 156 votes 16 years 3 months ago  PODS 2008»
Processing large data streams is now a major topic in data management. The data involved can be truly massive, and the required analyses complex. In a stream of sequential events ...
152 views 115 votes 15 years 8 months ago  LCN 2003»
In IEEE 802.11 wireless LANs, the DCF access method and the PCF access method operate alternatively within a superframe to service the time-varying traffic demands. Due to differ...