Sciweavers

1510 search results - page 138 / 302
» Secure Distributed Data Aggregation
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 4 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
OPODIS
2010
13 years 8 months ago
Self-stabilizing (k, r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths
Abstract. Wireless Ad-hoc networks are distributed systems that often reside in error-prone environments. Self-stabilization lets the system recover autonomously from an arbitrary ...
Andreas Larsson, Philippas Tsigas
SIGOPSE
2004
ACM
14 years 3 months ago
Long-term time-share guarantees are necessary for wireless LANs
Wireless local area networks (WLANs) based on a family of 802.11 technologies are becoming ubiquitous. These technologies support multiple data transmission rates. Transmitting at...
Godfrey Tan, John V. Guttag
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
14 years 3 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 4 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...