Sciweavers

1551 search results - page 73 / 311
» Privacy-Preserving Network Aggregation
Sort
View
IEAAIE
2010
Springer
13 years 5 months ago
Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation
The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation p...
Nele Verbiest, Chris Cornelis, Patricia Victor, En...
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 8 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
TIT
2010
138views Education» more  TIT 2010»
13 years 2 months ago
Functional compression through graph coloring
Motivated by applications to sensor networks and privacy preserving databases, we consider the problem of functional compression. The objective is to separately compress possibly c...
Vishal Doshi, Devavrat Shah, Muriel Médard,...
ICDE
2007
IEEE
94views Database» more  ICDE 2007»
14 years 9 months ago
RoXSum: Leveraging Data Aggregation and Batch Processing for XML Routing
Content-based routing is the primary form of communication within publish/subscribe systems. In those systems data transmission is performed by sophisticated overlay networks of c...
Zografoula Vagena, Mirella Moura Moro, Vassilis J....
ICNP
1999
IEEE
14 years 16 hour ago
On Individual and Aggregate TCP Performance
As the most widely used reliable transport in today's Internet, TCP has been extensively studied in the past. However, previous research usually only considers a small or med...
Lili Qiu, Yin Zhang, Srinivasan Keshav