Sciweavers

98 search results - page 17 / 20
» An information theoretic approach for privacy metrics
Sort
View
MINENET
2006
ACM
14 years 1 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 5 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
TWC
2008
198views more  TWC 2008»
13 years 7 months ago
Cross Layer Design for Multiaccess Communication Over Rayleigh Fading Channels
Abstract-- An information theoretic queueing model is proposed in a wireless multiple access communication setup. The proposed symmetric N user model captures physical layer parame...
Vidyut Naware, Lang Tong
ACMSE
2009
ACM
14 years 2 months ago
A case for compiler-driven superpage allocation
Most modern microprocessor-based systems provide support for superpages both at the hardware and software level. Judicious use of superpages can significantly cut down the number...
Joshua Magee, Apan Qasem
INFOCOM
2011
IEEE
12 years 11 months ago
User-centric data dissemination in disruption tolerant networks
Abstract—Data dissemination is useful for many applications of Disruption Tolerant Networks (DTNs). Current data dissemination schemes are generally network-centric ignoring user...
Wei Gao, Guohong Cao