— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
: Empirical evidence suggests that most nodes in BitTorrent (BT) participate in multiple torrents, but surprisingly little research exists on this topic. Here, we focus on a multi-...
In this paper, we present an experimental evaluation of three color-spatial retrieval techniques -- the signaturebased technique, the partition-based algorithm and the cluster-bas...
The notorious "dimensionality curse" is a well-known phenomenon for any multi-dimensional indexes attempting to scale up to high dimensions. One well known approach to o...
Hui Jin, Beng Chin Ooi, Heng Tao Shen, Cui Yu, Aoy...