Sciweavers

777 search results - page 44 / 156
» Secure broadcasting in large networks
Sort
View
PAKDD
2010
ACM
128views Data Mining» more  PAKDD 2010»
15 years 9 months ago
Privacy-Preserving Network Aggregation
Abstract. Consider the scenario where information about a large network is distributed across several different parties or commercial entities. Intuitively, we would expect that th...
Troy Raeder, Marina Blanton, Nitesh V. Chawla, Kei...
MASCOTS
2001
15 years 5 months ago
An Evaluation of Grouping Techniques for State Dissemination in Networked Multi-User Games
In a distributed multi-user game, entities need to communicate their state information to other entities. Usually only a subset of the game's entities are interested in infor...
Li Zou, Mostafa H. Ammar, Christophe Diot
MOBISYS
2007
ACM
16 years 4 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
ECUMN
2007
Springer
15 years 10 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
VLDB
1994
ACM
84views Database» more  VLDB 1994»
15 years 8 months ago
A Transaction Replication Scheme for a Replicated Database with Node Autonomy
Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and tr...
Ada Wai-Chee Fu, David Wai-Lok Cheung