Sciweavers

733 search results - page 132 / 147
» Recommending random walks
Sort
View
CCR
2010
133views more  CCR 2010»
14 years 9 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
73
Voted
CJ
2007
106views more  CJ 2007»
14 years 9 months ago
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Although the Yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment protocols analyzed by researchers from the computer s...
Kim-Kwang Raymond Choo
CN
2002
116views more  CN 2002»
14 years 9 months ago
Avoiding congestion collapse on the Internet using TCP tunnels
This paper discusses the application of TCP tunnels on the Internet and how Internet traffic can benefit from the congestion control mechanism of the tunnels. Primarily, we show t...
Boon Peng Lee, Rajesh Krishna Balan, Lillykutty Ja...
85
Voted
COR
2007
157views more  COR 2007»
14 years 9 months ago
A decision support system for the single-depot vehicle rescheduling problem
Disruptions in trips can prevent vehicles from executing their schedules as planned. Mechanical failures, accidents, and traffic congestion often hinder a vehicle schedule. When a...
Jing-Quan Li, Denis Borenstein, Pitu B. Mirchandan...
GEOINFORMATICA
2002
136views more  GEOINFORMATICA 2002»
14 years 9 months ago
Tabu Search Heuristic for Point-Feature Cartographic Label Placement
The generation of better label placement configurations in maps is a problem that comes up in automated cartographic production. The objective of a good label placement is to displ...
Missae Yamamoto, Gilberto Câmara, Luiz Anton...