Sciweavers

2269 search results - page 119 / 454
» Query Incentive Networks
Sort
View
P2P
2010
IEEE
189views Communications» more  P2P 2010»
15 years 3 months ago
Analyzing the DC File Sharing Network
—This paper investigates the Direct Connect (DC) file sharing network, which to the best of our knowledge, has never been academically studied before. We developed a participati...
Pavel Gurvich, Noam Koenigstein, Yuval Shavitt
GIS
2009
ACM
16 years 5 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
MDM
2009
Springer
192views Communications» more  MDM 2009»
15 years 11 months ago
Thresholded Range Aggregation in Sensor Networks
— The recent advances in wireless sensor technologies (e.g., Mica, Telos motes) enable the economic deployment of lightweight sensors for capturing data from their surrounding en...
Zhifeng Lin, Man Lung Yiu, Nikos Mamoulis
SIGMOD
2006
ACM
170views Database» more  SIGMOD 2006»
16 years 5 months ago
Energy-efficient monitoring of extreme values in sensor networks
Monitoring extreme values (MAX or MIN) is a fundamental problem in wireless sensor networks (and in general, complex dynamic systems). This problem presents very different algorit...
Adam Silberstein, Jun Yang 0001, Kamesh Munagala
AAAI
1990
15 years 6 months ago
Symbolic Probabilistic Inference in Belief Networks
The Symbolic Probabilistic Inference (SPI) Algorithm [D'Ambrosio, 19891 provides an efficient framework for resolving general queries on a belief network. It applies the conc...
Ross D. Shachter, Bruce D'Ambrosio, Brendan Del Fa...