Sciweavers

1551 search results - page 81 / 311
» Privacy-Preserving Network Aggregation
Sort
View
ISPDC
2005
IEEE
14 years 3 months ago
Towards Introducing Code Mobility on J2ME
This paper makes the case why mobile code is an appropriate solution for platforms running on mobile devices aggregated in mobile ad-hoc networks. It also presents a solution
Laurentiu Lucian Petrea, Dan Grigoras
ICNP
1999
IEEE
14 years 2 months ago
TCP Trunking: Design, Implementation and Performance
A TCP trunk is an aggregate traffic stream whose data packets are transported at a rate dynamically determined by TCP
H. T. Kung, Shie Yuan Wang
CTRSA
2008
Springer
113views Cryptology» more  CTRSA 2008»
13 years 12 months ago
Aggregate Message Authentication Codes
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on ...
Jonathan Katz, Andrew Y. Lindell
IJMSO
2006
105views more  IJMSO 2006»
13 years 10 months ago
Trust network-based filtering of aggregated claims
: On the semantic web, assertions may be aggregated from many sources, those aggregations filtered, reasoned over, aggregated with other aggregators, displayed, scraped, extracted,...
Jennifer Golbeck, Bijan Parsia
CORR
2006
Springer
70views Education» more  CORR 2006»
13 years 10 months ago
Scalable Algorithms for Aggregating Disparate Forecasts of Probability
- In this paper, computational aspects of the panel aggregation problem are addressed. Motivated primarily by applications of risk assessment, an algorithm is developed for aggrega...
Joel B. Predd, Sanjeev R. Kulkarni, Daniel N. Oshe...