We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...
Abstract--Distributed detection of information flows is considered in which traffic sensors at different locations of a network observe transmission epochs. The traffic sensors com...
Both the academia and practice recognize that information technology (IT) investments may not yield immediate benefits. Nevertheless, there has been a lack of methodological devel...
A common feature of congestion control protocols is the presence of information packets used to signal congestion. We address here the question of how frequently such protocols nee...
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient priva...