Sciweavers

1551 search results - page 93 / 156
» Privacy-Preserving Network Aggregation
Sort
View
103 views 134 votes 15 years 4 months ago  DEBS 2009»
Recently, decentralized publish-subscribe (pub-sub) systems have gained popularity as a scalable asynchronous messaging paradigm over wide-area networks. Most existing pub-sub sys...
224 views 171 votes 15 years 3 months ago  BMCBI 2010»
Background: Generally speaking, different classifiers tend to work well for certain types of data and conversely, it is usually not known a priori which algorithm will be optimal ...
95 views 118 votes 15 years 3 months ago  CN 2007»
Most of the research proposals on Quality-of-Service (QoS) mechanisms have focused on providing guarantees in a single domain. Supporting QoS guarantees in the interdomain setting...
78 views 134 votes 15 years 9 months ago  APNOMS 2007»
We propose a greedy algorithm to investigate the problem of how to schedule of a set of feasible transmissions under physical interference model. We also consider the fairness in s...
119 views 137 votes 14 years 10 months ago  CDC 2010»
We consider large scale interconnected systems where some of the interconnections are characterized by uncertain bounded delays. The delays may for instance be due to a communicati...
99 views 147 votes 15 years 4 months ago  CIIT 2004»
Despite numerous efforts, the problem of providing per-flow Quality of Service in a scalable manner still remains an active area of research. This paper introduces a scalable arch...
104 views 111 votes 15 years 10 months ago  GLOBECOM 2009»
— Network coding has recently received increasing attention to improve performance and increase capacity in both wired and wireless communication networks. In this paper, we focu...
131 views 147 votes 15 years 9 months ago  AINA 2007»
This paper focuses on sensor networks as shared environmental infrastructures, and presents an approach to enable a sensor network to self-partition itself, at pre-defined energy ...
93 views 128 votes 15 years 8 months ago  IMC 2004»
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
176 views 126 votes 15 years 1 months ago  INFOCOM 2010»
—Upon the occurrence of a phenomenon of interest in a wireless sensor network, multiple sensors may be activated, leading to data implosion and redundancy. Data aggregation and/o...