Sciweavers

7587 search results - page 1412 / 1518
» Network Analysis and Visualisation
Sort
View
ICC
2011
IEEE
199views Communications» more  ICC 2011»
14 years 2 months ago
Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Abstract—Tor is a well-known low-latency anonymous communication system. To prevent the traffic analysis attack, Tor packs application data into equal-sized cells. However, we f...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu

Publication
218views
13 years 7 months ago
Comparing Visual Feature Coding for Learning Disjoint Camera Dependencies
This paper systematically investigates the effectiveness of different visual feature coding schemes for facilitating the learning of time-delayed dependencies among disjoint multi-...
Xiatian Zhu, Shaogang Gong, and Chen Change Loy
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 5 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
INFOCOM
2012
IEEE
13 years 5 months ago
On superposition of heterogeneous edge processes in dynamic random graphs
—This paper builds a generic modeling framework for analyzing the edge-creation process in dynamic random graphs in which nodes continuously alternate between active and inactive...
Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov
CSFW
2012
IEEE
13 years 5 months ago
Generic Indifferentiability Proofs of Hash Designs
—In this paper, we propose a formal analysis of domain extenders for hash functions in the indifferentiability framework. We define a general model for domain extenders and prov...
Marion Daubignard, Pierre-Alain Fouque, Yassine La...
« Prev « First page 1412 / 1518 Last » Next »