-
Article
Open AccessThe effects of seasons and weather on sleep patterns measured through longitudinal multimodal sensing
Previous studies of seasonal effects on sleep have yielded unclear results, likely due to methodological differences and limitations in data size and/or quality. We measured the sleep habits of 216 individuals...
-
Chapter and Conference Paper
Provably Secure Contact Tracing with Conditional Private Set Intersection
The novel coronavirus COVID-19 spreads easily through personal contact, requiring the use of contact tracing to track the spread of the disease. Many existing approaches either trust a public health authority ...
-
Chapter and Conference Paper
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
In modern times, data collected from multi-user distributed applications must be analyzed on a massive scale to support critical business objectives. While analytics often requires the use of personal data, it...
-
Article
Open AccessNetwork analysis of the NetHealth data: exploring co-evolution of individuals’ social network positions and physical activities
Understanding the relationship between individuals’ social networks and health could help devise public health interventions for reducing incidence of unhealthy behaviors or increasing prevalence of healthy on...
-
Article
Open AccessAnalyzing the longitudinal impact of proximity, location, and personality on smartphone usage
Over the past few years, mobile devices, particularly smartphones have seen dramatic increases in data consumption. The significant increases in data usage have placed tremendous strain on the wireless infrast...
-
Chapter and Conference Paper
Systematic Dynamic and Heterogeneous Analysis of Rich Social Network Data
Recent technological advances have lead to increasing amounts of social network data that is longitudinal or encompasses multiple link types.We aim to provide a framework for systematic analysis of such data. ...
-
Chapter
GEMS: User Control for Cooperative Scientific Repositories
Opportunistic techniques have been widely used to create useful computational infrastructures and have demonstrated an ability to deliver computing resources to large applications. However, the management of d...
-
Chapter
Botnet Economics: Uncertainty Matters
Botnets have become an increasing security concern in today’s Internet. Thus far the mitigation to botnet attacks is a never ending arms race focusing on technical approaches. In this chapter, we model botnet-...
-
Chapter and Conference Paper
High Speed Packet Logging on a Budget
Creating high quality network trace files is a difficult task to accomplish on a limited budget. High network speeds may overburden an individual system running packet logging software such as tcpdump, resulti...
-
Chapter and Conference Paper
A Novel Approach for Transparent Bandwidth Conservation
In this paper, we present a novel approach, stealth multicast, which offers a practical solution for the adoption of network-level IP multicast. Rather than focusing on a global scale such as with previous app...
-
Chapter and Conference Paper
Stealth Multicast: A Novel Catalyst for Network-Level Multicast Deployment
While network-level multicast has tremendous potential for increasing the efficiency of group-oriented applications, the adoption of network-level multicast has been tepid at best. In this paper, we propose a ...