Sciweavers

554 search results - page 45 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
WSC
2008
13 years 10 months ago
Reliable simulation with input uncertainties using an interval-based approach
Uncertainty associated with input parameters and models in simulation has gained attentions in recent years. The sources of uncertainties include lack of data and lack of knowledg...
Ola Ghazi Batarseh, Yan Wang
AINA
2008
IEEE
14 years 2 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
ICSOC
2007
Springer
14 years 1 months ago
Let It Flow: Building Mashups with Data Processing Pipelines
Mashups are a new kind of interactive Web application, built out of the composition of two or more existing Web service APIs and data sources. Whereas “pure” mashups are built ...
Biörn Biörnstad, Cesare Pautasso
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
14 years 1 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
ICDE
2006
IEEE
124views Database» more  ICDE 2006»
14 years 1 months ago
Systematic Approach for Optimizing Complex Mining Tasks on Multiple Databases
It has been well recognized that data mining is an interactive and iterative process. In order to support this process, one of the long-term goals of data mining research has been...
Ruoming Jin, Gagan Agrawal