We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
We demonstrate that data reordering can substantially improve the performance of fine-grained irregular sharedmemory benchmarks, on both hardware and software shared-memory syste...
The development of sensing systems for urban deployments is still in its infancy. An interesting unresolved issue is the precise role assumed by people within such systems. This i...
Nicholas D. Lane, Shane B. Eisenman, Mirco Musoles...
Abstract. This paper presents a unifying framework to model casebased reasoning recommender systems (CBR-RSs). CBR-RSs have complex architectures and specialize the CBR problem sol...
With rapid development of web 2.0 technology and e-business, bloggers play significant roles in the blogosphere as well as the external world. In particular, influential bloggers c...