Sciweavers

2907 search results - page 22 / 582
» Trust analysis with clustering
Sort
View
SASO
2007
IEEE
14 years 4 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
CCGRID
2006
IEEE
14 years 4 months ago
QoS Oriented Resource Reservation in Shared Environments
Resource sharing across different computers and organizations makes it possible to support diverse, dynamic changing resource requirements of distributed applications. Reservation...
Ming Wu, Xian-He Sun, Yong Chen
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
14 years 3 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork
CIKM
2004
Springer
14 years 3 months ago
Mining gene expression datasets using density-based clustering
Given the recent advancement of microarray technologies, we present a density-based clustering approach for the purpose of co-expressed gene cluster identification. The underlyin...
Seokkyung Chung, Jongeun Jun, Dennis McLeod
BMCBI
2004
87views more  BMCBI 2004»
13 years 10 months ago
Selection of informative clusters from hierarchical cluster tree with gene classes
Background: A common clustering method in the analysis of gene expression data has been hierarchical clustering. Usually the analysis involves selection of clusters by cutting the...
Petri Törönen