We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. Balanced Hop-Constrained Path Enumeration in Signed Directed Graphs

    Hop-constrained path enumeration, which aims to output all the paths from two distinct vertices within the given hops, is one of the fundamental...
    Zhiyang Tang, **ghao Wang, ... Ying Zhang in Databases Theory and Applications
    Conference paper 2024
  2. Probabilistic Reverse Top-k Query on Probabilistic Data

    Reverse top-k queries have received much attention from research communities. The result of reverse top-k queries is a set of objects, which had the...
    Trieu Minh Nhut Le, **li Cao in Databases Theory and Applications
    Conference paper 2024
  3. Device Characterization for Opportunistic Networks

    When implementing opportunistic networks in real applications, not only connectivity problems need to be addressed, but also device restrictions....
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  4. Simulation Tools for Opportunistic Networks

    In this chapter, we start with an introduction to network simulators and especially to discrete event simulators. We explain how they work and what...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  5. Security in Opportunistic Networks

    Security is of paramount importance in Opportunistic Networks (OppNets) due to its unique characteristics and operational challenges. OppNets are...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  6. Connectivity Technologies for Opportunistic Networks

    This chapter explores the question of how to implement opportunistic networks in practice. The main part of this question considers the connectivity...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  7. Theoretical Models for Opportunistic Networks

    In this chapter, we detail how to use theoretical modeling in opportunistic networks (OppNets) using mathematical and computational methods to...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  8. Data Dissemination in Opportunistic Networks

    Data dissemination is the main research and implementation challenge in opportunistic networks. It addresses the question of how to forward data in a...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  9. Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs

    This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons...
    Jason Milionis, Ciamac C. Moallemi, Tim Roughgarden in Financial Cryptography and Data Security
    Conference paper 2024
  10. Eagle: Efficient Privacy Preserving Smart Contracts

    The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to...
    Carsten Baum, James Hsin-yu Chiang, ... Tore Kasper Frederiksen in Financial Cryptography and Data Security
    Conference paper 2024
  11. Provably Avoiding Geographic Regions for Tor’s Onion Services

    Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the...
    Arushi Arora, Raj Karra, ... Christina Garman in Financial Cryptography and Data Security
    Conference paper 2024
  12. Smart Noise Detection for Statistical Disclosure Attacks

    While anonymization systems like mix networks can provide privacy to their users by, e.g., hiding their communication relationships, several traffic...
    Marc Roßberger, Doğan Kesdoğan in Secure IT Systems
    Conference paper 2024
  13. Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees

    Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More...
    Giovanni Deligios, Chen-Da Liu-Zhang in Financial Cryptography and Data Security
    Conference paper 2024
  14. To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers

    WhatsApp stickers are a popular hybrid of images and emoticons that can contain user-created content. Stickers are mostly sent for legitimate...
    Samantha Klier, Harald Baier in Secure IT Systems
    Conference paper 2024
  15. On the Correlation Complexity of MPC with Cheater Identification

    Composable protocols for Multi-Party Computation that provide security with Identifiable Abort against a dishonest majority require some form of...
    Nicholas Brandt, Sven Maier, ... Jörn Müller-Quade in Financial Cryptography and Data Security
    Conference paper 2024
  16. IFGNN: An Individual Fairness Awareness Model for Missing Sensitive Information Graphs

    Graph neural networks (GNNs) provide an approach for analyzing complicated graph data for node, edge, and graph-level prediction tasks. However, due...
    Kejia Xu, Zeming Fei, ... Wenjie Zhang in Databases Theory and Applications
    Conference paper 2024
  17. Discovering Densest Subgraph over Heterogeneous Information Networks

    Densest Subgraph Discovery (DSD) is a fundamental and challenging problem in the field of graph mining in recent years. The DSD aims to determine,...
    Haozhe Yin, Kai Wang, ... Ying Zhang in Databases Theory and Applications
    Conference paper 2024
  18. Influence Maximization Revisited

    Influence Maximization (IM) has been extensively studied, which is to select a set of k seed users from a social network to maximize the expected...
    Yihan Geng, Kunyu Wang, ... Jeffrey Xu Yu in Databases Theory and Applications
    Conference paper 2024
  19. Maximum Fairness-Aware (k, r)-Core Identification in Large Graphs

    Cohesive subgraph mining is a fundamental problem in attributed graph analysis. The k-core model has been widely used in many studies to measure the...
    **ngyu Tan, Chengyuan Guo, ... Chen Chen in Databases Theory and Applications
    Conference paper 2024
  20. Spatial Shrinkage Prior: A Probabilistic Approach to Model for Categorical Variables with Many Levels

    One of the most commonly used methods to prevent overfitting and select relevant variables in regression models with many predictors is the penalized...
    Conference paper 2024
Did you find what you were looking for? Share feedback.