Bissias, George Dean
22  Ergebnisse:
Personensuche X
?
2

Surviving attacks on disruption-tolerant networks without a..:

, In: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing,
 
?
3

Bounding damage from link destruction, with application to ..:

Bissias, George Dean ; Levine, Brian Neil ; Rosenberg, Arnold
ACM SIGMETRICS Performance Evaluation Review.  35 (2007)  1 - p. 367-368 , 2007
 
?
4

Bounding damage from link destruction, with application to ..:

, In: Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems,
 
?
5

Bounds on Service Quality for Networks Subject to Augmentat..:

Bissias, George Dean
https://scholarworks.umass.edu/open_access_dissertations/264.  , 2010
 
?
6

ϵKTELO: A Framework for Defining Differentially Private Com..:

Zhang, Dan ; McKenna, Ryan ; Kotsogiannis, Ios...
ACM Transactions on Database Systems.  45 (2020)  1 - p. 1-44 , 2020
 
?
7

εKTELO : A Framework for Defining Differentially Private..:

Zhang, Dan ; McKenna, Ryan ; Kotsogiannis, Ios...
ACM Transactions on Database Systems (TODS).  45 (2020)  1 - p. 1-44 , 2020
 
?
8

Radium: Improving Dynamic PoW Targeting:

, In: Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology,
Bissias, George - p. 374-389 , 2020
 
?
10

Graphene : efficient interactive set reconciliation appl..:

, In: Proceedings of the ACM Special Interest Group on Data Communication,
 
?
11

Bonded Mining: Difficulty Adjustment by Miner Commitment:

, In: Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology,
 
?
12

PSynDB : accurate and accessible private data generation:

Huang, Zhiqi ; McKenna, Ryan ; Bissias, George...
Proceedings of the VLDB Endowment.  12 (2019)  12 - p. 1918-1921 , 2019
 
?
14

PSynDB: accurate and accessible private data generation:

Huang, Zhiqi ; McKenna, Ryan ; Bissias, George...
Proceedings of the VLDB Endowment.  12 (2019)  12 - p. 1918-1921 , 2019
 
?
15

Using Economic Risk to Model Miner Hash Rate Allocation in ..:

, In: Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology,
 
1-15