Sciweavers

2272 search results - page 85 / 455
» Provable Data Privacy
Sort
View
72
Voted
CORR
2008
Springer
77views Education» more  CORR 2008»
15 years 22 days ago
Data-Oblivious Stream Productivity
Abstract. We are concerned with demonstrating productivity of specifications of infinite streams of data, based on orthogonal rewrite rules. In general, this property is undecidabl...
Jörg Endrullis, Clemens Grabmayer, Dimitri He...
132
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Data centers power reduction: A two time scale approach for delay tolerant workloads
—In this work we focus on a stochastic optimization based approach to make distributed routing and server management decisions in the context of large-scale, geographically distr...
Yuan Yao, Longbo Huang, Abhishek Sharma, Leana Gol...
117
Voted
MSWIM
2009
ACM
15 years 7 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
75
Voted
POLICY
2007
Springer
15 years 6 months ago
Data-Purpose Algebra: Modeling Data Usage Policies
Data is often encumbered by restrictions on the ways in which it may be used. These restrictions on usage may be determined by statute, by contract, by custom, or by common decenc...
Chris Hanson, Tim Berners-Lee, Lalana Kagal, Geral...
ICDM
2007
IEEE
149views Data Mining» more  ICDM 2007»
15 years 7 months ago
Solving Consensus and Semi-supervised Clustering Problems Using Nonnegative Matrix Factorization
Consensus clustering and semi-supervised clustering are important extensions of the standard clustering paradigm. Consensus clustering (also known as aggregation of clustering) ca...
Tao Li, Chris H. Q. Ding, Michael I. Jordan