Results 1 to 10 of about 2,322,934 (202)

Anonymous Reviews:

open access: yesData Science Journal, 2012
In this article, the authors suggest that one method for increasing awareness of the benefits of data sharing can be affected by administering a survey, hopefully encouraging either a minority or majority influence on other members of the behavioural science community. The authors describe the process for creating such a survey and provide their survey,
Anonymous Anonymous
openaire   +4 more sources

Attacks by “Anonymous” WikiLeaks Proponents not Anonymous [PDF]

open access: yes, 2010
On November 28, 2010, the world started watching the whistle blower website WikiLeaks to begin publishing part of the 250,000 US Embassy Diplomatic cables. These confidential cables provide an insight on U.S.
Barbosa, R.R.R.   +8 more
core   +7 more sources

Parameterised Anonymity [PDF]

open access: yes, 2009
We introduce the notion of parameterised anonymity, to formalize the anonymity property of protocols with an arbitrary number of participants. This definition is an extension of the well known CSP anonymity formalization of Schneider and Sidiropoulos [18]. Using recently developed invariant techniques for solving parameterised boolean equation systems,
Jan Friso Groote, Simona Orzan
openaire   +3 more sources

Anonym: A tool for anonymization of the Internet traffic [PDF]

open access: yes2013 IEEE International Conference on Cybernetics (CYBCO), 2013
Collecting network traffic traces from deployed networks is one of the basic steps in understanding communication networks. Traffic traces are used for network management, traffic engineering, packet classification, and analyzing user behavior to ensure adequate quality of service.
Tanjila Farah, Ljiljana Trajkovic
openaire   +1 more source

Anonymous Assertion [PDF]

open access: yesEpisteme, 2013
AbstractThis paper addresses how the anonymity of an assertion affects the epistemological dimension of its production by speakers, and its reception by hearers. After arguing that anonymity does have implications in both respects, I go on to argue that at least some of these implications derive from a warranted diminishment in speakers' and hearers ...
openaire   +2 more sources

HORNET: High-speed Onion Routing at the Network Layer [PDF]

open access: yes, 2015
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range ...
Asoni, Daniele Enrico   +4 more
core   +2 more sources

Instant anonymization

open access: yesACM Transactions on Database Systems, 2011
Anonymization-based privacy protection ensures that data cannot be traced back to individuals. Researchers working in this area have proposed a wide variety of anonymization algorithms, many of which require a considerable number of database accesses. This is a problem of efficiency, especially when the released data is subject to visualization or when
Nergiz, Mehmet   +2 more
openaire   +3 more sources

In eigener Sache

open access: yesArachnologische Mitteilungen, 2005
Editorial
Anonymous, Anonymous
doaj   +1 more source

The use of rapid prototyping techniques (RPT) to manufacture micro channels suitable for high operation pressures and uPIV [PDF]

open access: yes, 2016
This paper aims to present a new methodology to manufacture micro-channels suitable for high operating pressures and micro particle image velocimetry (µPIV) measurements using a rapid-prototyping high-resolution 3D printer. This methodology can fabricate
Casals Terré, Jasmina   +3 more
core   +2 more sources

Konrad-Thaler-Gedächtnispreis der Arachnologischen Gesellschaft

open access: yesArachnologische Mitteilungen, 2007
memorial award, Konrad-Thaler ...
Anonymous, Anonymous
doaj   +1 more source

Home - About - Disclaimer - Privacy