Sciweavers

2287 search results - page 81 / 458
» Peer data exchange
Sort
View
ADBIS
2006
Springer
200views Database» more  ADBIS 2006»
14 years 2 months ago
Anomaly Detection Using Unsupervised Profiling Method in Time Series Data
The anomaly detection problem has important applications in the field of fraud detection, network robustness analysis and intrusion detection. This paper is concerned with the prob...
Zakia Ferdousi, Akira Maeda
ICIP
2005
IEEE
14 years 10 months ago
Correlation estimation for distributed source coding under information exchange constraints
Distributed source coding (DSC) depends strongly on accurate knowledge of correlation between sources. Previous works have reported capacity-approaching code constructions when ex...
Ngai-Man Cheung, Huisheng Wang, Antonio Ortega
ACMICEC
2004
ACM
162views ECommerce» more  ACMICEC 2004»
14 years 2 months ago
Balanced matching of buyers and sellers in e-marketplaces: the barter trade exchange model
In this paper, we describe the operation of barter trade exchanges by identifying key techniques used by trade brokers to stimulate trade and satisfy member needs, and present alg...
Peter Haddawy, Namthip Rujikeadkumjorn, Khaimook D...
DOCENG
2010
ACM
13 years 10 months ago
APEX: automated policy enforcement eXchange
: APEX: Automated Policy Enforcement eXchange Steven J. Simske, Helen Balinsky HP Laboratories HPL-2010-134 Policy, Text Analysis, Policy Server, Policy Editor, Document Systems, ...
Steven J. Simske, Helen Balinsky
AFRICACRYPT
2010
Springer
14 years 3 months ago
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communica...
Michel Abdalla, Céline Chevalier, Mark Manu...