Traditionally, scheduling policies have been optimized to perform well on metrics, such as throughput, delay, and fairness. In the context of shared event schedulers, where a common processor is shared among multiple users, one also has to consider the privacy offered by the scheduling policy. The privacy offered by a scheduling policy measures how much information about the usage pattern of one user of the system can be learned by another as a consequence of sharing the scheduler. We introduced an estimation error-based metric to quantify this privacy. We showed that the most commonly deployed scheduling policy, the first-come-first-served offers very little privacy to its users. We also proposed a parametric nonwork conserving policy, whi...
Game-theoretic Demand Side Management (DSM) systems have been investigated as a decentralized approa...
Machine learning (ML) models can leak information about users, and differential privacy (DP) provide...
In this paper we present three scheduling mechanisms that are manipulation-proof or closed systems. ...
Traditionally, scheduling policies have been optimized to perform well on metrics such as throughput...
Abstract—We study the privacy compromise due to a queuing side channel which arises when a resource ...
Timing side channels in two-user schedulers are studied. When two users share a scheduler, one user ...
Schedules define how resources process jobs in diverse domains, reaching from healthcare to transpor...
Abstract—In this work, we study information leakage in timing side channels that arise in the contex...
When multiple job processes are served by a single scheduler, the queueing delays of one process are...
Progress in mobile wireless technology has resulted in the increased use of mobile devices to store ...
Services providers, such as public healthcare systems and government agencies, are under tremendous ...
Abstract—In this paper we propose and analyse a traffic shaping defense against timing-based traffic...
Meeting scheduling (MS) is a practical task in everyday life that involves independent agents with d...
Demand side management (DSM) makes it possible to adjust the load experienced by the power grid whil...
In this paper we present three scheduling mechanisms that are manipulation-proof for closed systems....
Game-theoretic Demand Side Management (DSM) systems have been investigated as a decentralized approa...
Machine learning (ML) models can leak information about users, and differential privacy (DP) provide...
In this paper we present three scheduling mechanisms that are manipulation-proof or closed systems. ...
Traditionally, scheduling policies have been optimized to perform well on metrics such as throughput...
Abstract—We study the privacy compromise due to a queuing side channel which arises when a resource ...
Timing side channels in two-user schedulers are studied. When two users share a scheduler, one user ...
Schedules define how resources process jobs in diverse domains, reaching from healthcare to transpor...
Abstract—In this work, we study information leakage in timing side channels that arise in the contex...
When multiple job processes are served by a single scheduler, the queueing delays of one process are...
Progress in mobile wireless technology has resulted in the increased use of mobile devices to store ...
Services providers, such as public healthcare systems and government agencies, are under tremendous ...
Abstract—In this paper we propose and analyse a traffic shaping defense against timing-based traffic...
Meeting scheduling (MS) is a practical task in everyday life that involves independent agents with d...
Demand side management (DSM) makes it possible to adjust the load experienced by the power grid whil...
In this paper we present three scheduling mechanisms that are manipulation-proof for closed systems....
Game-theoretic Demand Side Management (DSM) systems have been investigated as a decentralized approa...
Machine learning (ML) models can leak information about users, and differential privacy (DP) provide...
In this paper we present three scheduling mechanisms that are manipulation-proof or closed systems. ...