Sciweavers

167 search results - page 22 / 34
» A Game-Theoretic Approach to Anonymous Networking
Sort
View
ICDM
2008
IEEE
121views Data Mining» more  ICDM 2008»
14 years 1 months ago
Unifying Unknown Nodes in the Internet Graph Using Semisupervised Spectral Clustering
Most research on Internet topology is based on active measurement methods. A major difficulty in using these tools is that one comes across many unresponsive routers. Different m...
Anat Almog, Jacob Goldberger, Yuval Shavitt
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
14 years 4 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
IJCAI
2003
13 years 8 months ago
People Tracking with Anonymous and ID-Sensors Using Rao-Blackwellised Particle Filters
Estimating the location of people using a network of sensors placed throughout an environment is a fundamental challenge in smart environments and ubiquitous computing. Id-sensors...
Dirk Schulz, Dieter Fox, Jeffrey Hightower
PERCOM
2011
ACM
13 years 2 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
EOR
2008
109views more  EOR 2008»
13 years 7 months ago
Basin-wide cooperative water resources allocation
The Cooperative Water Allocation Model (CWAM) is designed within a general mathematical programming framework for modeling equitable and efficient water allocation among competing...
Lizhong Wang, Liping Fang, Keith W. Hipel