Sciweavers

1266 search results - page 123 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
DASFAA
2004
IEEE
125views Database» more  DASFAA 2004»
15 years 8 months ago
Reducing Communication Cost in a Privacy Preserving Distributed Association Rule Mining
Data mining is a process that analyzes voluminous digital data in order to discover hidden but useful patterns from digital data. However, discovery of such hidden patterns has sta...
Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
HPCC
2005
Springer
15 years 10 months ago
High Performance Subgraph Mining in Molecular Compounds
Structured data represented in the form of graphs arises in several fields of the science and the growing amount of available data makes distributed graph mining techniques partic...
Giuseppe Di Fatta, Michael R. Berthold
ICDE
2006
IEEE
192views Database» more  ICDE 2006»
16 years 5 months ago
Approximating Aggregation Queries in Peer-to-Peer Networks
Peer-to-peer databases are becoming prevalent on the Internet for distribution and sharing of documents, applications, and other digital media. The problem of answering large scal...
Benjamin Arai, Gautam Das, Dimitrios Gunopulos, Va...
GISCIENCE
2004
Springer
110views GIS» more  GISCIENCE 2004»
15 years 9 months ago
Information Dissemination in Mobile Ad-Hoc Geosensor Networks
This paper addresses the issue of how to disseminate relevant information to mobile agents within a geosensor network. Conventional mobile and location-aware systems are founded on...
Silvia Nittel, Matt Duckham, Lars Kulik
NOMS
2000
IEEE
15 years 8 months ago
Failure semantics of mobile agent systems involved in network fault management
Recently mobile agent technology has been recognised as a potential tool for realising distributed network fault management. The autonomy and mobility of such agents can help ensu...
Otto Wittner, Bjarne E. Helvik, C. J. E. Holper