Sciweavers

1551 search results - page 132 / 311
» Privacy-Preserving Network Aggregation
Sort
View
PVLDB
2008
146views more  PVLDB 2008»
13 years 9 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
IROS
2007
IEEE
105views Robotics» more  IROS 2007»
14 years 4 months ago
Experiments in robotic boat localization
— We are motivated by the prospect of automating microbial observing systems. To this end we have designed and built a robotic boat as part of a sensor network for monitoring aqu...
Amit Dhariwal, Gaurav S. Sukhatme
SIGCOMM
2010
ACM
13 years 10 months ago
The case for crowd computing
We introduce and motivate crowd computing, which combines mobile devices and social interactions to achieve large-scale distributed computation. An opportunistic network of mobile...
Derek Gordon Murray, Eiko Yoneki, Jon Crowcroft, S...
CCS
1999
ACM
14 years 2 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speci...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
SIGMOD
2011
ACM
297views Database» more  SIGMOD 2011»
13 years 1 months ago
Graph cube: on warehousing and OLAP multidimensional networks
We consider extending decision support facilities toward large sophisticated networks, upon which multidimensional attributes are associated with network entities, thereby forming...
Peixiang Zhao, Xiaolei Li, Dong Xin, Jiawei Han