Sciweavers

295 search results - page 37 / 59
» Large scale content distribution protocols
Sort
View
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 9 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
ECEH
2006
116views Healthcare» more  ECEH 2006»
13 years 9 months ago
Next Generation Network Infrastructure Enabling Telemonitoring Services
: In the next few decades one of the main problems to deal with in Western Europe is the aging of the population. The healthcare sector will face rising costs and increasing worklo...
Sietse Dijkstra, Erik van Essen, Robert Westers
WD
2010
13 years 2 months ago
Mobility-aware peer-to-peer live-streaming
Application Layer Multicast (ALM) has become a popular form of content distribution. It shows some favourable properties like inherent scalability and the overcoming of the traditi...
Markus Trapp, Mathias Fischer, Guenter Schaefer
ICDCS
2008
IEEE
14 years 2 months ago
Relative Network Positioning via CDN Redirections
—Many large-scale distributed systems can benefit from a service that allows them to select among alternative nodes based on their relative network positions. A variety of appro...
Ao-Jan Su, David R. Choffnes, Fabián E. Bus...
IPPS
2005
IEEE
14 years 1 months ago
GUARD: Gossip Used for Autonomous Resource Detection
A growing trend in the development and deployment of grid computing systems is decentralization. Decentralizing these systems helps make them more scalable and robust, but poses s...
Sagnik Nandy, Larry Carter, Jeanne Ferrante