Sciweavers

208 search results - page 4 / 42
» Computing Anonymously with Arbitrary Knowledge
Sort
View
SIBGRAPI
2007
IEEE
14 years 2 months ago
Application-independent accurate mouse placements on surfaces of arbitrary geometry
Most direct manipulation tasks rely on precise placements of the cursor on the object of interest. Commonly, this requires the knowledge of distinct application-dependent geometry...
Harlen Costa Batagelo, Shin-Ting Wu
WDAG
2007
Springer
105views Algorithms» more  WDAG 2007»
14 years 1 months ago
Rendezvous of Mobile Agents in Unknown Graphs with Faulty Links
A group of identical mobile agents moving asynchronously among the nodes of an anonymous network have to gather together in a single node of the graph. This problem known as the (a...
Jérémie Chalopin, Shantanu Das, Nico...
CCS
2005
ACM
14 years 1 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
SIGCOMM
2003
ACM
14 years 29 days ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
VDA
2010
166views Visualization» more  VDA 2010»
13 years 5 months ago
Critical region analysis of scalar fields in arbitrary dimensions
The exploration of multidimensional scalar fields is commonly based on the knowledge of the topology of their isosurfaces. The latter is established through the analysis of critic...
Madjid Allili, Marc Ethier, Tomasz Kaczynski