Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Consensus clustering is the problem of reconciling clustering information about the same data set coming from different sources or from different runs of the same algorithm. Cast ...
Several activities in service oriented computing can benefit from the knowledge of properties of a given service composition ahead of time. We will focus here on properties related...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
Simulation-based training is increasingly being used within the military to practice and develop the skills of successful soldiers. For the skills associated with successful milit...
Andrew Gordon, Michael van Lent, Martin Van Velsen...
Queueing models are routinely used to analyze the performance of software systems. However, contrary to common assumptions, the time that a software server takes to complete jobs ...