Sciweavers

460 search results - page 4 / 92
» Sharing Private Information Across Distributed Databases
Sort
View
75
Voted
USS
2008
14 years 12 months ago
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) ...
Ari Juels, Ravikanth Pappu, Bryan Parno
89
Voted
JAIR
2008
104views more  JAIR 2008»
14 years 9 months ago
M-DPOP: Faithful Distributed Implementation of Efficient Social Choice Problems
In the efficient social choice problem, the goal is to assign values, subject to side constraints, to a set of variables to maximize the total utility across a population of agent...
Adrian Petcu, Boi Faltings, David C. Parkes
93
Voted
OTM
2005
Springer
15 years 3 months ago
Don't Mind Your Vocabulary: Data Sharing Across Heterogeneous Peers
The strong dynamics of peer-to-peer networks, coupled with the diversity of peer vocabularies, makes query processing in peer database systems a very challenging task. In this pape...
Mehedi Masud, Iluju Kiringa, Anastasios Kementsiet...
72
Voted
CAISE
2003
Springer
15 years 2 months ago
Sharing Mobile Databases in Dynamically Configurable Environments
We define a Mobile Database Community (MDBC) as a dynamic collection of autonomous mobile databases in which each database user can access databases in the community through a wir...
Angelo Brayner, José de Aguiar Moraes Filho
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
15 years 3 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li