Sciweavers

2958 search results - page 22 / 592
» Using Anonymized Data for Classification
Sort
View
107
Voted
PEWASUN
2004
ACM
15 years 5 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
86
Voted
PERCOM
2005
ACM
16 years 1 days ago
Anonymous Content Sharing in Ad Hoc Networks
It may be costly for mobile pervasive computing device users to download content from the Internet using their 3G connections if the 3G connection cost is a function of the amount...
Seung-Seok Kang, Matt W. Mutka, Li Xiao
ICNP
2007
IEEE
15 years 6 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik
99
Voted
KES
2008
Springer
15 years 12 days ago
A Semantic Language for Querying Anonymous Web Sources
A great deal of work has been carried out in recent years to facilitate access to data and information available on the Web. Proposals converge in two additional areas which consis...
Francois Pinet, Michel Schneider
AUSDM
2008
Springer
212views Data Mining» more  AUSDM 2008»
15 years 2 months ago
Clustering and Classification of Maintenance Logs using Text Data Mining
Spreadsheets applications allow data to be stored with low development overheads, but also with low data quality. Reporting on data from such sources is difficult using traditiona...
Brett Edwards, Michael Zatorsky, Richi Nayak