The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
The Internet is witnessing explosive growth in traffic due to bulk content transfers, such as multimedia and software downloads, and online sharing of personal, commercial, and sc...
Massimiliano Marcon, Nuno Santos, P. Krishna Gumma...
Large amount of monitoring data can be collected from distributed systems as the observables to analyze system behaviors. However, without reasonable models to characterize systems...
Scientific research is becoming increasingly relied on collaborative effort among multiple institutions and interdisciplinary consortium, through sharing experiments and data, and...
Fusheng Wang, Peiya Liu, John Pearson, Fred Azar, ...