Sciweavers

28 search results - page 2 / 6
» No free lunch in data privacy
Sort
View
ISI
2008
Springer
13 years 5 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen
IEEEARES
2008
IEEE
13 years 12 months ago
On the Possibility of Small, Service-Free Disk Based Storage Systems
For many storage providers, the cost of providing service calls exceeds the costs of the hardware being serviced. In this paper, we show that zeromaintenance, small disk arrays ar...
Jehan-François Pâris, Thomas J. E. Sc...
STORAGESS
2006
ACM
13 years 11 months ago
Using free web storage for data backup
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to e...
Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez...
ACSAC
2006
IEEE
13 years 11 months ago
An Internet Voting System Supporting User Privacy
This work introduces the A system1 , an Internetbased, free and open source electronic voting system which employs strong cryptography. Our system is a fully functiona...
Aggelos Kiayias, Michael Korman, David Walluck
USENIX
2000
13 years 6 months ago
Traffic Data Repository at the WIDE Project
It becomes increasingly important for both network researchers and operators to know the trend of network traffic and to find anomaly in their network traffic. This paper describe...
Kenjiro Cho, Koushirou Mitsuya, Akira Kato