Sciweavers

1191 search results - page 213 / 239
» Distributed Detection of Information Flows
Sort
View
JCP
2006
100views more  JCP 2006»
13 years 7 months ago
A Local Enumeration Protocol in Spite of Corrupted Data
We present a novel self-stabilizing version of Mazurkiewicz enumeration algorithm [1]. The initial version is based on local rules to enumerate nodes on an anonymous network. [2] p...
Brahim Hamid, Mohamed Mosbah
JUCS
2006
128views more  JUCS 2006»
13 years 7 months ago
A Web-Based Decision Support System for Chronic Diseases
: Individuals vary in survival chances due to differences in genetics, environmental exposures, and gene-environment interactions. These chances, as well as the contribution of eac...
Chi-Chan Chang, Chuen-Sheng Cheng, Yeu-Shiang Huan...
JSAC
2007
93views more  JSAC 2007»
13 years 7 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
IJUFKS
2002
78views more  IJUFKS 2002»
13 years 7 months ago
On the Security of Microaggregation with Individual Ranking: Analytical Attacks
Microaggregation is a statistical disclosure control technique. Raw microdata (i.e. individual records) are grouped into small aggregates prior to publication. With fixed-size grou...
Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Anna...
UM
2010
Springer
13 years 6 months ago
User Modeling for Telecommunication Applications: Experiences and Practical Implications
Abstract. Telecommunication applications based on user modeling focus on extracting customer behavior and preferences from the information implicitly included in Call Detail Record...
Heath Hohwald, Enrique Frías-Martíne...