The wide deployment of information systems based on data mining technology in decision making, the issue of antidiscrimination in data mining did not receive much attention until 2008. Some proposals are oriented to the discovery and measure of discrimination. Others deal with the prevention of discrimination. The approach is based on mining classification rules (the […]
Cryptographic Puzzle Hiding Scheme
Wireless networks rely on the uninterrupted availability of the wireless medium to interconnect participating nodes. The open nature of this medium leaves it vulnerable to multiple security threats. Anyone with a transceiver can eavesdrop on wireless transmissions, inject spurious messages, or jam legitimate ones. While eaves- dropping and message injection can be prevented using cryptographic […]
VM multiplexing resource allocation scheme to manage decentralized resources
The design of our dynamic optimal proportional-share resource allocation method, which leverages the proportional share model.The key idea to redistribute available resources among running tasks dynamically, such that these tasks could use up the maximum capacity of each resource in a node (i.e., up to cðpsÞ), while each task’s execution time can be further minimized […]