Video sharing is an increasingly popular application in OSNs. The client/server architecture deployed by current video sharing systems in OSNs costs a large amount of resources (i.e. money, server storage) for the service provider and lacks scalability. The privacy constraints in OSNs, the current peer-assisted Video-on-Demand (VoD) techniques are suboptimal if not entirely applicable to […]
Effect of Social Distance on Video Viewing Patterns
Online social networks (OSNs) (e.g., Facebook, Twitter) are now among the most popular sites on the Web. An OSN provides a powerful means of establishing social connections and sharing, organizing, and finding content. For example, Facebook presently has over 500 million users. Unlike current file or video sharing systems (e.g., BitTorrent and YouTube), which are […]
Sophisticated Attack On Queuing Mechanisms
Queueing mechanisms are major mechanisms used in variety of computer and communications systems. Their major objective is to control the system operation when it is under heavy traffic load in order to provide good and fair performance to the various users. Since these system are responsible for the resource allocation and taking care of the […]
Itembased collaborative filtering method using Pearson Correlation Coefficient
Cloud computing is becoming popular. A number of works have been carried out on cloud computing , including performance analysis, market-oriented cloud computing, management tool, workload balance, dynamic selection, etc. Quality-of-service has been widely employed for presenting the nonfunctional characteristics of the software systems and services . QoS of cloud services can be measured from […]
Userbased collaborative filtering method using vector Similarity
Cloud computing is Internet-based computing, whereby shared configurable resources (e.g., infrastructure, platform, and software) are provided to computers and other devices as services . Strongly promoted by the leading industrial companies (e.g., Amazon, Google, Microsoft, IBM, etc.), cloud computing is quickly becoming popular in recent years. Applications deployed in the cloud environment (named cloud applications […]
Parameters an Analytic hierarchy process
A Cloud service can be classified by many different factors that represent its overall performance and features. An example of a classification of such factors is provided by the Service Measurement Index (SMI) . The SMI framework summarizes the most important QoS attributes for Cloud offerings on a high level, such like Accountability, Agility, and […]
Migration Decision Support System
The increasing domination of Cloud computing solutions in the software market means that existing applications may need to migrate to this environment, in order to reap the benefits of reduced infrastructural costs and dynamic access to computational resources. While applications have already started being developed specifically for the Cloud (forming Cloud-native applications), existing systems must […]
Limitation on Possible Duplicate Relaying
A simple and provably secure encryption allowing encrypted data to be efficiently and additively aggregated. Only a modular addition is needed for cipher-text aggregation. Scheme security is based on the in distinguish ability property of a pseudorandom function (PRF), a standard cryptographic primitive. It was proved that aggregation based on this can efficiently compute statistical […]
POSITION-BASED OPPORTUNISTIC ROUTING
Wireless sensor networks (WSNs) and MOBILE ad hoc networks (MANETs) are used increasingly in many applications like wild habitat monitoring, forest fire detection, and military surveillance. After deployment in the field sensor nodes organize themselves into a multihop network, the base station being the central control point. Usually sensor nodes are greatly hampered by due […]
Sybil defender Is Efficient and Scalable To Large Social Networks
One promising way to defend against sybil attacks in social networks is to leverage the social network topologies. Decentralized algorithms, SybilGuard and SybilLimit to determine whether a suspect node is Sybil or not. SybilGuard and SybilLimit both rely on the assumption that social networks are fast mixing (explained later), and the number of attack edges […]
- « Previous Page
- 1
- …
- 35
- 36
- 37
- 38
- 39
- …
- 108
- Next Page »