The performance of an anonymous path can be described using many network metrics – e.g., bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have ...
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Abstract--Individual privacy will be at risk if a published data set is not properly deidentified. k-Anonymity is a major technique to deidentify a data set. Among a number of k-an...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
A variety of (dis)similarity measures for one-dimensional point processes (e.g., spike trains) are investigated, including the Victor-Purpura distance metric, the van Rossum distan...
When users' tasks in a distributed heterogeneous computing environment (e.g., cluster of heterogeneous computers) are allocated resources, the total demand placed on some sys...
Jong-Kook Kim, Debra A. Hensgen, Taylor Kidd, Howa...