Sciweavers

2079 search results - page 232 / 416
» Quantifying Information Flow
Sort
View
CIKM
2008
Springer
13 years 11 months ago
Vanity fair: privacy in querylog bundles
A recently proposed approach to address privacy concerns in storing web search querylogs is bundling logs of multiple users together. In this work we investigate privacy leaks tha...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
INFORMS
2008
104views more  INFORMS 2008»
13 years 9 months ago
Estimating Cycle Time Percentile Curves for Manufacturing Systems via Simulation
Cycle time-throughput (CT-TH) percentile curves quantify the relationship between percentiles of cycle time and factory throughput, and they can play an important role in strategi...
Feng Yang, Bruce E. Ankenman, Barry L. Nelson
GAMESEC
2010
128views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Tracking Games in Mobile Networks
Abstract. Users of mobile networks can change their identifiers in regions called mix zones in order to defeat the attempt of third parties to track their location. Mix zones must ...
Mathias Humbert, Mohammad Hossein Manshaei, Julien...
IMC
2010
ACM
13 years 7 months ago
Selecting representative IP addresses for internet topology studies
An Internet hitlist is a set of addresses that cover and can represent the the Internet as a whole. Hitlists have long been used in studies of Internet topology, reachability, and...
Xun Fan, John Heidemann
ICC
2009
IEEE
114views Communications» more  ICC 2009»
13 years 7 months ago
Energy Efficiency of Fixed-Rate Wireless Transmissions under QoS Constraints
1 Transmission over wireless fading channels under quality of service (QoS) constraints is studied when only the receiver has perfect channel side information. Being unaware of the...
Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar