نتایج جستجو برای: aggregator
تعداد نتایج: 1737 فیلتر نتایج به سال:
We consider applications where an untrusted aggregator would like to collect privacy sensitive data from users, and compute aggregate statistics periodically. For example, imagine a smart grid operator who wishes to aggregate the total power consumption of a neighborhood every ten minutes; or a market researcher who wishes to track the fraction of population watching ESPN on an hourly basis. We...
Power-law (PL) formalism is known to provide an appropriate framework for canonical modeling of nonlinear systems. We estimated three stochastically distinct models of constant elasticity of substitution (CES) class functions as non-linear inverse problem and showed that these PL related functions should have a closed form. The first model is related to an aggregator production function, the se...
Recently, many studies have suggested that an electric vehicle (EV) is one of the means for increasing the reliability of power systems in new energy environments. EVs can make a contribution to improving reliability by providing frequency regulation in power systems in which the Vehicle-to-Grid (V2G) technology has been implemented and, if economically viable, can be helpful in increasing powe...
Existing work on secure data collection and aggregation is mainly focused on confidentiality issues. That is, ensuring that the untrusted Aggregator learns only the aggregation result without divulging individual data inputs. In this paper however we consider a malicious Aggregator which is not only interested in compromising users’ privacy but also is interested in providing bogus aggregate va...
Multimedia services need to be supported by content, metadata and workflow management systems to efficiently manage huge amount of content items and metadata production as in the case of cultural institutions. Online digital libraries and cultural heritage institutions and the other portals of publishers need an integrated multimedia back office in order to aggregate content and provide them to...
Serious security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a high risk of data confidentiality. In this study, we propose a securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Initially network i...
This paper presents a novel scoring rule-based mechanism that encourages agents to produce costly estimates of future events and truthfully report them to a centre when the budget for payments to the agents is itself determined by their reports. This is applied to a model of aggregated demand prediction within a microgrid where, given estimates of future consumptions, an aggregator must optimal...
We consider the forecast aggregation problem in repeated settings, where the forecasts are done on a binary event. At each period multiple experts provide forecasts about an event. The goal of the aggregator is to aggregate those forecasts into a subjective accurate forecast. We assume that experts are Bayesian; namely they share a common prior, each expert is exposed to some evidence, and each...
Demand Response (DR) programs serve to reduce the consumption of electricity at times when the supply is scarce and expensive. Consumers or agents with flexible consumption profiles are recruited by an aggregator who manages the DR program. The utility informs the aggregator of an anticipated DR event. In response, the aggregator is required to deliver a target reduction in electricity consumpt...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید