Sciweavers

1737 search results - page 120 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
15 years 8 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu
122
Voted
WISEC
2010
ACM
15 years 7 months ago
Zeroing-in on network metric minima for sink location determination
The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Zhenhua Liu, Wenyuan Xu
ICPR
2004
IEEE
16 years 3 months ago
A New Color Image Segmentation Algorithm based on Watershed Transformation
A new color segmentation method is presented in this paper. The method is specified for color images that have both large and small objects, and objects with both step and ramp ed...
Marat Kazanov
EMO
2005
Springer
107views Optimization» more  EMO 2005»
15 years 8 months ago
Multiobjective Water Pinch Analysis of the Cuernavaca City Water Distribution Network
Water systems often allow efficient water uses via water reuse and/or recirculation. Defining the network layout connecting water-using processes is a complex problem which involv...
Carlos E. Mariano-Romero, Víctor Alcocer-Ya...
CISSE
2008
Springer
15 years 4 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome