Sciweavers

316 search results - page 52 / 64
» Top-K aggregation queries over large networks
Sort
View
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
14 years 11 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
GLOBECOM
2007
IEEE
15 years 4 months ago
On the Long-Range Dependent Behaviour of Unidirectional Packet Delay of Wireless Traffic
— In contrast to aggregate inter-packet metrics that quantify the arrival processes of aggregate traffic at a single point in the network, intraflow end-to-end per-packet perform...
Dimitrios P. Pezaros, Manolis Sifalakis, David Hut...
ICWN
2004
14 years 11 months ago
Searching in Variably Connected P2P Networks
Peer-to-Peer networks are gaining popularity through file-sharing communities. Most P2P networks demand a certain stability from it's nodes in order to function satisfactory. ...
Njål T. Borch, Lars Kristian Vognild
ANSS
2008
IEEE
15 years 4 months ago
Simulation of Buffer Management Policies in Networks for Grids
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of resources that are geographically distributed across different location...
Agustín C. Caminero, Anthony Sulistio, Blan...
NECO
2011
14 years 4 months ago
Collective Stability of Networks of Winner-Take-All Circuits
The neocortex has a remarkably uniform neuronal organization, suggesting that common principles of processing are employed throughout its extent. In particular, the patterns of co...
Ueli Rutishauser, Rodney J. Douglas, Jean-Jacques ...