Abstract An infrastructure is currently being deployed for delivering multimedia services using IP endto-end. Mobile devices and application resources, because of their computing c...
Abstract— Many asynchronous designs are naturally specified and implemented hierarchically as an interconnection of separate asynchronous modules that operate concurrently and c...
Models of real world systems are being increasingly generated from data that describes the behaviour of systems. Data mining techniques, such as Artificial Neural Networks (ANN),...
In open societies such as multi-agent systems, it is important that coordination among the several actors is achieved efficiently. One economical way of capturing that aspiration ...
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...