Sciweavers

359 search results - page 27 / 72
» A Clustering Approach for Achieving Data Privacy
Sort
View
IWCC
1999
IEEE
13 years 11 months ago
Single I/O Space for Scalable Cluster Computing
In this paper, we propose a novel Single I/O Space architecture for achieving a Single System Image (SSI) at the I/O subsystem level. This is very much desired in a scalable clust...
Roy S. C. Ho, Hai Jin, Kai Hwang
EUROISI
2008
13 years 9 months ago
Homeland Security Data Mining Using Social Network Analysis
The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon ...
Hsinchun Chen
ICC
2007
IEEE
177views Communications» more  ICC 2007»
14 years 1 months ago
An Energy-Aware Protocol for Data Gathering Applications in Wireless Sensor Networks
—Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energ...
Ming Liu, Yuan Zheng, Jiannong Cao, Guihai Chen, L...
DBSEC
2010
101views Database» more  DBSEC 2010»
13 years 8 months ago
Generalizing PIR for Practical Private Retrieval of Public Data
Private retrieval of public data is useful when a client wants to query a public data service without revealing the specific query data to the server. Computational Private Informa...
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
SAC
2010
ACM
14 years 21 days ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper