Sciweavers

480 search results - page 42 / 96
» Anonymous Transactions in Computer Networks
Sort
View
116
Voted
COMSNETS
2012
183views more  COMSNETS 2012»
13 years 8 months ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz
222
Voted
PERVASIVE
2011
Springer
14 years 3 months ago
Identifying Important Places in People's Lives from Cellular Network Data
People spend most of their time at a few key locations, such as home and work. Being able to identify how the movements of people cluster around these “important places” is cru...
Sibren Isaacman, Richard Becker, Ramón C&aa...
97
Voted
PDIS
1994
IEEE
15 years 4 months ago
Achieving Transaction Scaleup on Unix
Constructing scalable high-performance applications on commodity hardware running the Unix operating system is a problem that must be addressed in several application domains. We ...
Marie-Anne Neimat, Donovan A. Schneider
93
Voted
CSIE
2009
IEEE
15 years 7 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
103
Voted
ICPADS
1996
IEEE
15 years 4 months ago
An optimal deadlock resolution algorithm in multidatabase systems
In this paper, we propose a novel deadlock resolution algorithm. In the presence of global deadlocks in a multidatabase system, this algorithm always selects an optimal set of vic...
Xuemin Lin, Jian Chen