Disclosures of health databases for secondary purposes is increasing rapidly. In this paper, we develop and evaluate a reidentification risk metric for the case where an intruder ...
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
We investigate the complexity of performing updates on probabilistic XML data for various classes of probabilistic XML documents of different succinctness. We consider two elemen...
To face the increasing demand from users, National Statistical Institutes (NSI) release different information products. The dissemination of this information should be performed ...
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
In this paper we develop, implement and evaluate an approach to quickly reassign resources for a virtualized utility computing platform. The approach provides this platform agilit...
Wei Zhang, Hangwei Qian, Craig E. Wills, Michael R...
For garbage-collected applications, dynamically-allocated objects are contained in a heap. Programmer productivity improves significantly if there is a garbage collector to autom...
In this paper we provide a general method to derive productform solutions for stochastic models. We take inspiration from the Reversed Compound Agent Theorem [14] and we provide a...