Sciweavers

1551 search results - page 230 / 311
» Privacy-Preserving Network Aggregation
Sort
View
AAAI
2006
13 years 10 months ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...
BMCBI
2010
109views more  BMCBI 2010»
13 years 9 months ago
Functional characterization and topological modularity of molecular interaction networks
Background: Analyzing interaction networks for functional characterization poses significant challenges arising from the noisy, incomplete, and generic nature of both the interact...
Jayesh Pandey, Mehmet Koyutürk, Ananth Grama
JSAC
2008
254views more  JSAC 2008»
13 years 9 months ago
Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks
We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet sch...
Hang Su, Xi Zhang
CIKM
2010
Springer
13 years 7 months ago
Mining topic-level influence in heterogeneous networks
Influence is a complex and subtle force that governs the dynamics of social networks as well as the behaviors of involved users. Understanding influence can benefit various applic...
Lu Liu, Jie Tang, Jiawei Han, Meng Jiang, Shiqiang...
GIS
2010
ACM
13 years 7 months ago
Using location based social networks for quality-aware participatory data transfer
The sensing systems that monitor physical environments rely on communication infrastructures (wired or wireless) to collect data from the sensors embedded in the environment. Howe...
Houtan Shirani-Mehr, Farnoush Banaei Kashani, Cyru...