Search
Skip to Search Results
Filter
Subject / Keyword
Departments
Author / Creator / Contributor
Year
Collections
Languages
Item type
-
Fall 2014
By eavesdropping on a user's query in a sensor network, an adversary can deduce both the user's current location and his/her location of interest. Issuing k queries instead of one (our "k-query" scheme) protects the privacy of the user's location of interest, but facilitates the adversary...
-
Fall 2010
A fair and optimal mechanism is required for allocating bandwidth to virtual machine migration in a WAN environment. In this thesis, we propose a dynamic resource allocation algorithm running in either centralized or distributed environments. The centralized version of our algorithm collects...
1 - 2 of 2