publié le: 2020
Unknown RFID tags appear when tagged items are not scanned before being moved into a warehouse, which can even cause serious security issues. This pap...
Sharding is a method for allocating data items to nodes of a distributed caching or storage system based on the result of a hash function computed on...
Micro-burst traffic is not uncommon in data centers. It can cause packet dropping, which may result in serious performance degradation (e.g., Incast p...
In order to handle a high traffic demand, dense wireless local area networks (WLANs) have been deployed rapidly in the past years. However, dense WLAN...
We study a problem of privacy-preserving mechanism design. A data collector wants to obtain data from individuals to perform some computations. To rel...