Sciweavers

834 search results - page 64 / 167
» Quantifying and Measuring Anonymity
Sort
View
TCAD
2010
107views more  TCAD 2010»
13 years 4 months ago
Evaluating Statistical Power Optimization
In response to the increasing variations in integrated-circuit manufacturing, the current trend is to create designs that take these variations into account statistically. In this ...
Jason Cong, Puneet Gupta, John Lee
KDD
2005
ACM
99views Data Mining» more  KDD 2005»
14 years 10 months ago
Determining an author's native language by mining a text for errors
In this paper, we show that stylistic text features can be exploited to determine an anonymous author's native language with high accuracy. Specifically, we first use automat...
Moshe Koppel, Jonathan Schler, Kfir Zigdon
VLDB
2006
ACM
122views Database» more  VLDB 2006»
14 years 10 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
FC
2010
Springer
188views Cryptology» more  FC 2010»
14 years 2 months ago
Building Incentives into Tor
Abstract. Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as th...
Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach
PAM
2012
Springer
12 years 5 months ago
Detecting Pedophile Activity in BitTorrent Networks
Abstract. The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal ...
Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, Noa ...