Sciweavers

480 search results - page 42 / 96
» Anonymous Transactions in Computer Networks
Sort
View
COMSNETS
2012
183views more  COMSNETS 2012»
12 years 4 months ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz
PERVASIVE
2011
Springer
12 years 11 months ago
Identifying Important Places in People's Lives from Cellular Network Data
People spend most of their time at a few key locations, such as home and work. Being able to identify how the movements of people cluster around these “important places” is cru...
Sibren Isaacman, Richard Becker, Ramón C&aa...
PDIS
1994
IEEE
14 years 25 days ago
Achieving Transaction Scaleup on Unix
Constructing scalable high-performance applications on commodity hardware running the Unix operating system is a problem that must be addressed in several application domains. We ...
Marie-Anne Neimat, Donovan A. Schneider
CSIE
2009
IEEE
14 years 3 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
ICPADS
1996
IEEE
14 years 27 days ago
An optimal deadlock resolution algorithm in multidatabase systems
In this paper, we propose a novel deadlock resolution algorithm. In the presence of global deadlocks in a multidatabase system, this algorithm always selects an optimal set of vic...
Xuemin Lin, Jian Chen