Sciweavers

808 search results - page 43 / 162
» Distributed Anonymization: Achieving Privacy for Both Data S...
Sort
View
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
14 years 7 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
CCS
2007
ACM
13 years 11 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
DAMON
2008
Springer
13 years 9 months ago
CAM conscious integrated answering of frequent elements and top-k queries over data streams
Frequent elements and top-k queries constitute an important class of queries for data stream analysis applications. Certain applications require answers for both frequent elements...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
IPSN
2004
Springer
14 years 1 months ago
Distributed beamforming for information transfer in sensor networks
Energy efficient transfer of data from sensors is a fundamental problem in sensor networks. In this paper, we propose a distributed beamforming approach to this problem, with a cl...
Gwen Barriac, Raghuraman Mudumbai, Upamanyu Madhow
MDM
2007
Springer
125views Communications» more  MDM 2007»
14 years 1 months ago
Extending P3P/Appel for Friend Finder
FriendFinder as a location-based service collects location data from mobile users and distributes a particular user’s location upon request. Privacy of users data especially loc...
Emin Islam Tatli