Sciweavers

38890 search results - page 7738 / 7778
» Will It Work
Sort
View
ICDE
2012
IEEE
202views Database» more  ICDE 2012»
11 years 11 months ago
Differentially Private Spatial Decompositions
— Differential privacy has recently emerged as the de facto standard for private data release. This makes it possible to provide strong theoretical guarantees on the privacy and ...
Graham Cormode, Cecilia M. Procopiuc, Divesh Sriva...
INFOCOM
2012
IEEE
11 years 11 months ago
Approximate convex decomposition based localization in wireless sensor networks
—Accurate localization in wireless sensor networks is the foundation for many applications, such as geographic routing and position-aware data processing. An important research d...
Wenping Liu, Dan Wang, Hongbo Jiang, Wenyu Liu, Ch...
INFOCOM
2012
IEEE
11 years 11 months ago
Sherlock is around: Detecting network failures with local evidence fusion
—Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct central...
Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu
INFOCOM
2012
IEEE
11 years 11 months ago
Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance
—There is a growing interest in exploiting interference (rather than avoiding it) to increase network throughput. In particular, the so-called successive interference cancellatio...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou,...
INFOCOM
2012
IEEE
11 years 11 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
« Prev « First page 7738 / 7778 Last » Next »