Sciweavers

2842 search results - page 511 / 569
» Expansion and Search in Networks
Sort
View
CCS
2003
ACM
14 years 3 months ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
DIGRA
2003
Springer
14 years 3 months ago
Uncle Roy all around you: mixing games and theatre on the city streets
We describe Uncle Roy All Around You, a mixture of game and theatre that took place in central London in late May and early June of 2003. Street players, equipped with handheld co...
Martin Flintham, Rob Anastasi, Steve Benford, Adam...
ICCS
2003
Springer
14 years 3 months ago
A Compress-Based Association Mining Algorithm for Large Dataset
The association mining is one of the primary sub-areas in the field of data mining. This technique had been used in numerous practical applications, including consumer market baske...
Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
ICCSA
2010
Springer
14 years 3 months ago
Geospatial Analysis of Cooperative Works on Asymmetric Information Environment
In the so-called Information-Explosion Era, astronomical amount of information is ubiquitously produced and digitally stored. It is getting more and more convenient for cooperative...
Tetsuya Kusuda, Tetsuro Ogi
IPPS
2002
IEEE
14 years 3 months ago
On Reliable and Scalable Peer-to-Peer Web Document Sharing
We propose a peer-to-peer Web document sharing technique, called “Browsers-Aware Proxy Server”. In this design, a proxy server connecting to a group of networked clients maint...
Li Xiao, Xiaodong Zhang, Zhichen Xu