Sciweavers

3356 search results - page 575 / 672
» Thresholds and Expectation Thresholds
Sort
View
CSFW
2011
IEEE
12 years 9 months ago
Dynamic Enforcement of Knowledge-Based Security Policies
—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...
ICC
2011
IEEE
185views Communications» more  ICC 2011»
12 years 9 months ago
An Information-Theoretic Approach to Accelerated Simulation of Hybrid-ARQ Systems
—In order to reduce the long runtimes required to simulate hybrid automatic repeat-request (ARQ) systems, such as high-speed downlink packet access (HSDPA), we propose an informa...
Matthew C. Valenti
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
15 years 9 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
CSCW
2012
ACM
12 years 5 months ago
Collaboratively crowdsourcing workflows with turkomatic
Preparing complex jobs for crowdsourcing marketplaces requires careful attention to workflow design, the process of decomposing jobs into multiple tasks, which are solved by multi...
Anand Pramod Kulkarni, Matthew Can, Björn Har...
INFOCOM
2012
IEEE
12 years 4 days ago
Achievable transmission capacity of cognitive mesh networks with different media access control
—Spectrum sharing is an emerging mechanism to resolve the conflict between the spectrum scarcity and the growing demands for the wireless broadband access. In this paper we inve...
Tao Jing, Xiuying Chen, Yan Huo, Xiuzhen Cheng