Sciweavers

1599 search results - page 138 / 320
» Probabilistic Analysis of Anonymity
Sort
View
USENIX
2000
13 years 9 months ago
Pandora: A Flexible Network Monitoring Platform
This paper presents Pandora, a network monitoring platform that captures packets using purely passive techniques. Pandora addresses current needs for improving Internet middleware...
Simon Patarin, Mesaac Makpangou
IFIP
2010
Springer
13 years 3 months ago
Modeling Identity-Related Properties and Their Privacy Strength
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...
Meilof Veeningen, Benne de Weger, Nicola Zannone
CORR
2011
Springer
163views Education» more  CORR 2011»
13 years 4 days ago
Axiomatic Attribution for Multilinear Functions
We study the attribution problem, that is, the problem of attributing a change in the value of a characteristic function f to its independent variables. We make three contributions...
Yi Sun, Mukund Sundararajan
CJ
2010
150views more  CJ 2010»
13 years 5 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
SAGA
2007
Springer
14 years 2 months ago
Probabilistic Techniques in Algorithmic Game Theory
We consider applications of probabilistic techniques in the framework of algorithmic game theory. We focus on three distinct case studies: (i) The exploitation of the probabilistic...
Spyros C. Kontogiannis, Paul G. Spirakis