Sciweavers

177
Voted
SIGMETRICS
2012
ACM
253views Hardware» more  SIGMETRICS 2012»
13 years 7 months ago
Characterizing continuous time random walks on time varying graphs
In this paper we study the behavior of a continuous time random walk (CTRW) on a stationary and ergodic time varying dynamic graph. We establish conditions under which the CTRW is...
Daniel R. Figueiredo, Philippe Nain, Bruno F. Ribe...
160
Voted
SIGMETRICS
2012
ACM
197views Hardware» more  SIGMETRICS 2012»
13 years 7 months ago
Fluid limit of an asynchronous optical packet switch with shared per link full range wavelength conversion
We consider an asynchronous all optical packet switch (OPS) where each link consists of N wavelength channels and a pool of C ≤ N full range tunable wavelength converters. Under...
Benny Van Houdt, Luca Bortolussi
202
Voted
PET
2012
Springer
13 years 7 months ago
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the heavy-hitters across a set of distributed streams. Since each stream can contain ...
T.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchan...
167
Voted
PET
2012
Springer
13 years 7 months ago
Fault-Tolerant Privacy-Preserving Statistics
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation m...
Marek Jawurek, Florian Kerschbaum
145
Voted
PET
2012
Springer
13 years 7 months ago
Exploring the Ecosystem of Referrer-Anonymizing Services
The constant expansion of the World Wide Web allows users to enjoy a wide range of products and services delivered directly to their browsers. At the same time however, this expans...
Nick Nikiforakis, Steven Van Acker, Frank Piessens...
PET
2012
Springer
13 years 7 months ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter
163
Voted
PET
2012
Springer
13 years 7 months ago
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization
This paper presents Anonymouth, a novel framework for anonymizing writing style. Without accounting for style, anonymous authors risk identification. This framework is necessary t...
Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan...
PET
2012
Springer
13 years 7 months ago
PRISM - Privacy-Preserving Search in MapReduce
We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves pr...
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva,...
PET
2012
Springer
13 years 7 months ago
Understanding Statistical Disclosure: A Least Squares Approach
It is widely accepted that Disclosure Attacks are effective against high-latency anonymous communication systems. A number of Disclosure Attack variants can be found in the litera...
Fernando Pérez-González, Carmela Tro...
PET
2012
Springer
13 years 7 months ago
Evading Censorship with Browser-Based Proxies
While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxi...
David Fifield, Nate Hardison, Jonathan Ellithorpe,...