Sciweavers

76 search results - page 7 / 16
» The art of the meta-aspect protocol
Sort
View
EDBT
2008
ACM
172views Database» more  EDBT 2008»
14 years 7 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
DEBS
2008
ACM
13 years 9 months ago
Replica placement for high availability in distributed stream processing systems
A significant number of emerging on-line data analysis applications require the processing of data streams, large amounts of data that get updated continuously, to generate output...
Thomas Repantis, Vana Kalogeraki
SOFSEM
1998
Springer
13 years 11 months ago
Distributed Systems Technology for Electronic Commerce Applications
Abstract. Based on the specific characteristics of electronic commerce (ECommerce) requirements for an adequate system support, this contribution gives an overview of the respectiv...
Winfried Lamersdorf, Michael Merz, M. Tuan Tu
DEXAW
2004
IEEE
109views Database» more  DEXAW 2004»
13 years 11 months ago
Internet, GRID, Self-Adaptability and Beyond: Are We Ready?
This paper reflects different understanding and positions on future trends of GRID-oriented technologies, applications, and networks, as perceived by representatives from industry...
Petre Dini, Wolfgang Gentzsch, Mark Potts, Alexand...
USS
2008
13 years 9 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...