Effective attacks and provable defenses for website fingerprinting

T Wang, X Cai, R Nithyanand, R Johnson… - 23rd USENIX Security …, 2014 - usenix.org
Website fingerprinting attacks allow a local, passive eavesdropper to identify a user's web
activity by leveraging packet sequence information. These attacks break the privacy …

[KNYGA][B] An introduction to Kolmogorov complexity and its applications

M Li, P Vitányi - 2008 - Springer
Ming Li Paul Vitányi Fourth Edition Page 1 An Introduction to Kolmogorov Complexity and Its
Applications Ming Li Paul Vitányi Fourth Edition Texts in Computer Science Page 2 Texts in …

A survey of longest common subsequence algorithms

L Bergroth, H Hakonen, T Raita - … International Symposium on …, 2000 - ieeexplore.ieee.org
The aim of this paper is to give a comprehensive comparison of well-known longest common
subsequence algorithms (for two input strings) and study their behaviour in various …

[PDF][PDF] A compendium of NP optimization problems

P Crescenzi, V Kann, M Halldórsson - 1995 - Citeseer
Due to the fact that no NP-complete problem can be solved in polynomial time (unless P=
NP), many approximability results (both positive and negative) of NP-hard optimization …

On the complexity of comparing evolutionary trees

J Hein, T Jiang, L Wang, K Zhang - Discrete Applied Mathematics, 1996 - Elsevier
We study the computational complexity and approximation of several problems arising in the
comparison of evolutionary trees. It is shown that the maximum agreement subtree (MAST) …

Some MAX SNP-hard results concerning unordered labeled trees

K Zhang, T Jiang - Information Processing Letters, 1994 - Elsevier
Given two rooted, labeled, and unordered trees, we consider the problem of finding the
largest common sub-tree and the problem of finding the edit distance between them. We …

Becoming the super turker: Increasing wages via a strategy from high earning workers

S Savage, CW Chiang, S Saito, C Toxtli… - Proceedings of The Web …, 2020 - dl.acm.org
Crowd markets have traditionally limited workers by not providing transparency information
concerning which tasks pay fairly or which requesters are unreliable. Researchers believe …

[KNYGA][B] Modular system design and evaluation

MS Levin - 2015 - Springer
The frame approach for representing knowledge (ie, collection of frames are linked together
into frame-system) has been suggested by Marvin Minsky. In this approach, the frame …

An island model based ant system with lookahead for the shortest supersequence problem

R Michel, M Middendorf - … conference on parallel problem solving from …, 1998 - Springer
In this paper we introduce an Ant Colony Optimisation (ACO) algorithm for the Shortest
Common Supersequence (SCS) problem, which has applications in production system …

PURR: a primitive for reconfigurable fast reroute: hope for the best and program for the worst

M Chiesa, R Sedar, G Antichi, M Borokhovich… - Proceedings of the 15th …, 2019 - dl.acm.org
Highly dependable communication networks usually rely on some kind of Fast Re-Route
(FRR) mechanism which allows to quickly re-route traffic upon failures, entirely in the data …