Sciweavers

347 search results - page 9 / 70
» On private computation in incomplete networks
Sort
View
MMMACNS
2005
Springer
14 years 1 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
WINE
2005
Springer
107views Economy» more  WINE 2005»
14 years 1 months ago
Price of Anarchy of Network Routing Games with Incomplete Information
We consider a class of networks where n agents need to send their traffic from a given source to a given destination over m identical, non-intersecting, and parallel links. For suc...
Dinesh Garg, Yadati Narahari
IMC
2009
ACM
14 years 2 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...
CMSB
2003
Springer
14 years 26 days ago
A Method for Estimating Metabolic Fluxes from Incomplete Isotopomer Information
Metabolic flux estimation—the problem of finding out the rates of reactions in metabolic pathways—is an important problem area in the study of metabolism. The most accurate t...
Juho Rousu, Ari Rantanen, Hannu Maaheimo, Esa Pitk...
AIMS
2007
Springer
14 years 1 months ago
Estimating Reliability of Conditional Promises
Using conditional promises, the reliability of promises can be measured without considering the reliability of the whole agent, by defining notions of when conditions operate and ...
Alva L. Couch, Hengky Susanto, Marc Chiarini