Sciweavers

2808 search results - page 383 / 562
» Routing betweenness centrality
Sort
View
ISI
2005
Springer
15 years 11 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
15 years 11 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal
MADNES
2005
Springer
15 years 11 months ago
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract ...
Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
NIME
2005
Springer
132views Music» more  NIME 2005»
15 years 11 months ago
"iltur" - Connecting Novices and Experts Through Collaborative Improvisation
The iltur system features a novel method of interaction between expert and novice musicians through a set of musical controllers called Beatbugs. Beatbug players can record live m...
Gil Weinberg, Scott Driscoll
PCI
2005
Springer
15 years 11 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...