scispace - formally typeset
Search or ask a question
Topic

Proxy (statistics)

About: Proxy (statistics) is a research topic. Over the lifetime, 5257 publications have been published within this topic receiving 94504 citations. The topic is also known as: proxy variable & proxy measurement.


Papers
More filters
Journal ArticleDOI
TL;DR: A progressive video caching policy is designed in which each video can be cached at several levels corresponding to cached data sizes and required WAN bandwidths, which allows the proxy to adjust caching amount for each video based on its resource condition and the user access pattern.
Abstract: Proxy servers have been used to cache web objects to alleviate the load of the web servers and to reduce network congestion on the Internet. In this paper, a central video server is connected to a proxy server via wide area networks (WANs) and the proxy server can reach many clients via local area networks (LANs). We assume a video can be either entirely or partially cached in the proxy to reduce WAN bandwidth consumption. Since the storage space and the sustained disk I/O bandwidth are limited resources in the proxy, how to efficiently utilize these resources to maximize the WAN bandwidth reduction is an important issue. We design a progressive video caching policy in which each video can be cached at several levels corresponding to cached data sizes and required WAN bandwidths. For a video, the proxy server determines to cache a smaller amount of data at a lower level or to gradually accumulate more data to reach a higher level. The proposed progressive caching policy allows the proxy to adjust caching amount for each video based on its resource condition and the user access pattern. We investigate the scenarios in which the access pattern is priorly known or unknown and the effectiveness of the caching policy is evaluated.

28 citations

Book ChapterDOI
20 Dec 2004
TL;DR: This work extends the security definitions introduced in [2] to the scenario of fully distributed proxy signature schemes, and proposes a specific scheme which is secure in this new model.
Abstract: In a proxy signature scheme, a potential signer delegates his capabilities to a proxy signer, who can sign documents on behalf of him The recipient of the signature verifies both identities: that of the delegator and that of the proxy signer There are many proposals of proxy signature schemes, but security of them has not been considered in a formal way until the appearance of [2,8] If the entities which take part in a proxy signature scheme are formed by sets of participants, then we refer to it as a fully distributed proxy signature scheme [4] In this work, we extend the security definitions introduced in [2] to the scenario of fully distributed proxy signature schemes, and we propose a specific scheme which is secure in this new model

28 citations

Book ChapterDOI
03 Nov 2006
TL;DR: This paper gives the first formal security definitions and notions of proxy ring signatures, and proposes a short proxy ring signature scheme, with rigorous security proofs, that is more efficient than the existingproxy ring signature schemes.
Abstract: Proxy ring signatures allow proxy signer to sign messages on behalf of the original signer while providing anonymity. In this paper, we give the first formal security definitions and notions of proxy ring signatures. Subsequently, we propose a short proxy ring signature scheme, with rigorous security proofs. It is more efficient than the existing proxy ring signature schemes. Finally, we propose a new kind of proxy ring signatures. Existing proxy ring signatures in the literature provide anonymity for proxy signer only. We extend the notion to support anonymity for original signer as well. We give an efficient and secure instantiation of it.

28 citations

Posted Content
TL;DR: Results on benchmark and real-world datasets demonstrate that improving fairness metrics for proxy groups can work well in practice, but it is cautioned that the effectiveness likely depends on the choice of fairness metric, as well as how aligned the proxy groups are with the true protected groups in terms of the constrained model parameters.
Abstract: We consider the problem of improving fairness when one lacks access to a dataset labeled with protected groups, making it difficult to take advantage of strategies that can improve fairness but require protected group labels, either at training or runtime. To address this, we investigate improving fairness metrics for proxy groups, and test whether doing so results in improved fairness for the true sensitive groups. Results on benchmark and real-world datasets demonstrate that such a proxy fairness strategy can work well in practice. However, we caution that the effectiveness likely depends on the choice of fairness metric, as well as how aligned the proxy groups are with the true protected groups in terms of the constrained model parameters.

27 citations

Patent
19 May 2009
TL;DR: In this article, a collaborative messaging and data distribution system includes a text-messaging engine executing on a processor for sending and receiving messages among a plurality of users, including an information proxy.
Abstract: A collaborative messaging and data distribution system includes a text-messaging engine executing on a processor for sending and receiving messages among a plurality of users. The text-messaging engine includes an information proxy for distributing information among at least one information source and the plurality of users. The information proxy appears as one of the plurality of users.

27 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,242
20222,473
2021334
2020262
2019250
2018282