Sciweavers

5123 search results - page 90 / 1025
» Performance and Security Tradeoff
Sort
View
CCS
2008
ACM
15 years 6 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
HASE
2008
IEEE
15 years 11 months ago
Privacy, Preservation and Performance: The 3 P's of Distributed Data Management
Privacy, preservation and performance (“3 P’s”) are central design objectives for distributed data management systems. However, these objectives tend to compete with one ano...
Bobji Mungamuru, Hector Garcia-Molina
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 2 months ago
Performance Evaluation of Components Using a Granularity-based Interface Between Real-Time Calculus and Timed Automata
nalysis of a TA modeled component. First, we abstract fine models to work with event streams at coarse granularity. We perform analysis of the component at multiple coarse granular...
Karine Altisen, Yanhong Liu, Matthieu Moy
CHI
2010
ACM
15 years 11 months ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...
INFOCOM
2007
IEEE
15 years 10 months ago
A Proxy View of Quality of Domain Name Service
— The Domain Name System (DNS) provides a critical service for the Internet – mapping of user-friendly domain names to their respective IP addresses. Yet, there is no standard ...
Lihua Yuan, Krishna Kant, Prasant Mohapatra, Chen-...