This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
: Empirical evidence suggests that most nodes in BitTorrent (BT) participate in multiple torrents, but surprisingly little research exists on this topic. Here, we focus on a multi-...
In this paper, we present an experimental evaluation of three color-spatial retrieval techniques -- the signaturebased technique, the partition-based algorithm and the cluster-bas...
The notorious "dimensionality curse" is a well-known phenomenon for any multi-dimensional indexes attempting to scale up to high dimensions. One well known approach to o...
Hui Jin, Beng Chin Ooi, Heng Tao Shen, Cui Yu, Aoy...