Sciweavers

208 search results - page 4 / 42
» Computing Anonymously with Arbitrary Knowledge
Sort
View
99
Voted
SIBGRAPI
2007
IEEE
15 years 9 months ago
Application-independent accurate mouse placements on surfaces of arbitrary geometry
Most direct manipulation tasks rely on precise placements of the cursor on the object of interest. Commonly, this requires the knowledge of distinct application-dependent geometry...
Harlen Costa Batagelo, Shin-Ting Wu
104
Voted
WDAG
2007
Springer
105views Algorithms» more  WDAG 2007»
15 years 8 months ago
Rendezvous of Mobile Agents in Unknown Graphs with Faulty Links
A group of identical mobile agents moving asynchronously among the nodes of an anonymous network have to gather together in a single node of the graph. This problem known as the (a...
Jérémie Chalopin, Shantanu Das, Nico...
124
Voted
CCS
2005
ACM
15 years 8 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
129
Voted
SIGCOMM
2003
ACM
15 years 8 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
148
Voted
VDA
2010
166views Visualization» more  VDA 2010»
15 years 18 days ago
Critical region analysis of scalar fields in arbitrary dimensions
The exploration of multidimensional scalar fields is commonly based on the knowledge of the topology of their isosurfaces. The latter is established through the analysis of critic...
Madjid Allili, Marc Ethier, Tomasz Kaczynski