Communities in DSpace

Select a community to browse its collections.

Recently Added

  • HOU, Ruomu; JAHJA, Irvan; LUU, Loi; SAXENA, Prateek; YU, Haifeng
    In a sybil attack, an adversary creates a large number of fake identities/nodes and have them join the system. Computational puzzles have long been investigated as a possible sybil defense: If a node fails to solve the ...
  • JAHJA, Irvan; YU, Haifeng; ZHAO, Yuda
    This paper considers several closely-related problems in synchronous dynamic networks with oblivious adversaries, and proves novel (d + poly(m)) lower bounds on their time complexity (in terms of rounds). Here d is the ...
  • LIU, Qing; BASU, Debabrota; GOEL, Shruti; ABDESSALEM, Talel; BRESSANE, Stéphane (2017-06-06)
    One of the modern pillars of collaborative filtering and recommender systems is collection and exploitation of ratings from users. Likert scale is a psychometric quantifi er of ratings popular among the electronic commerce ...
  • BASU, Debabrota; WANG, Xiayang; HONG, Yang; CHEN, Haibo; BRESSAN, Stéphane (2017-04-04)
    Cloud providers leverage live migration of virtual machines to reduce energy consumption and allocate resources efficiently in data centers. Each migration decision depends on three questions: when to move a virtual machine, ...
  • NGUYEN, Manh-Dung; DONG, Naipeng; ROYCHOUDHURY, Abhik (2017-01-25)
    Security is a big concern in widely adopting security critical systems, such as Unmanned Aerial Vehicles (UAV). To ensure security of a system, the rst step is to identify the required security properties as well as the ...

View more