Sciweavers

390 search results - page 27 / 78
» Protecting Data Privacy in Structured P2P Networks
Sort
View
EDBTW
2004
Springer
14 years 1 months ago
A Query-Adaptive Partial Distributed Hash Table for Peer-to-Peer Systems
The two main approaches to find data in peer-to-peer (P2P) systems are unstructured networks using flooding and structured networks using a distributed index. A distributed index i...
Fabius Klemm, Anwitaman Datta, Karl Aberer
HCI
2009
13 years 5 months ago
An Interactive-Content Technique Based Approach to Generating Personalized Advertisement for Privacy Protection
Personalized contents have been getting more attention from industry and academia due to its effective communicative role in product advertisements. However, there exist potential ...
Wook-Hee Min, Yun-Gyung Cheong
ADMA
2008
Springer
147views Data Mining» more  ADMA 2008»
14 years 2 months ago
Mining Supplemental Frequent Patterns
The process of resource distribution and load balance of a distributed P2P network can be described as the process of mining Supplement Frequent Patterns (SFPs) from query transact...
Yintian Liu, Yingming Liu, Tao Zeng, Kaikuo Xu, Ro...
ICIP
2008
IEEE
14 years 9 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
TMC
2008
159views more  TMC 2008»
13 years 6 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu