A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
This paper describes and analyzes the aggregation pheromone system (APS) algorithm, which extends ant colony optimization (ACO) to continuous domains. APS uses the collective behav...
The application of social network analysis techniques, along with graph visualization and interaction, for navigating syndicated web content, a.k.a webfeeds, is presented. Within ...
A complete MPEG-4 stream consists of many elementary streams which may be generated by different authors. In the scenario of this paper, each author signs his own authentic elemen...
Developing safe multithreaded software systems is difficult due to the potential unwanted interference among concurrent threads. This paper presents a flexible methodology for o...
Bart Jacobs 0002, Frank Piessens, K. Rustan M. Lei...