Sciweavers

480 search results - page 33 / 96
» Anonymous Transactions in Computer Networks
Sort
View
AAMAS
2006
Springer
13 years 8 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
IJCAI
2003
13 years 10 months ago
People Tracking with Anonymous and ID-Sensors Using Rao-Blackwellised Particle Filters
Estimating the location of people using a network of sensors placed throughout an environment is a fundamental challenge in smart environments and ubiquitous computing. Id-sensors...
Dirk Schulz, Dieter Fox, Jeffrey Hightower
CCS
2010
ACM
13 years 9 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim
FOSSACS
2005
Springer
14 years 2 months ago
Foundations of Web Transactions
A timed extension of π-calculus with a transaction construct – the calculus webπ – is studied. The underlying model of webπ relies on networks of processes; time proceeds as...
Cosimo Laneve, Gianluigi Zavattaro
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
14 years 5 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu