It is essential to detect inconsistencies or failures early. In manufacturing and logistic processes, items are tracked continuously to detect loss or to reroute them during transport. To answer this need complex event processing (CEP) systems have evolved as a key paradigm for business and industrial applications. CEP systems allow to detect situations by performing […]
The Prevalence Of Craigslist Based (Automobile) Scams
Craigslist is an online platform for classified advertisements. Its impact on local economy is non-negligible. For example, such advertisements reduce housing rental vacancy rates. The success of Craigslist is limited by persistent scams. The possibility of being scammed could prevent transactions from being completed. In economic terms, the expected value of loss due to a […]
The Recursive Loop-Free Alternative (RLFA) method
We present a method to find an alternate path, after a link failure, from a source node to a destination node. Since reconvergence of an Interior Gateway Protocol (IGP) (e.g., OSPF or IS-IS) can take hundreds of milliseconds, there is a need for a method that will find an alternate path in less time than […]
A mobile presence service is an essential component of a social network application
We describe previous researches on presence services, and survey the presence service of existing systems. Well known commercial IM systems leverage some form of centralized clusters to provide presence services. A taxonomy of different features and functions supported by the three most popular IM systems, AIM, Microsoft MSN and Yahoo! Messenger. The authors also provided […]
Random sampling by Proposing negative bootstrap
To automatically create a negative training set for a given concept, the mainstream methods randomly sample a relatively small subset from a large pool of (user-tagged) examples. The pool may consist of web images with free texts or consumer photos with user provided tags. Apart from the obvious fact that random sampling is simple and […]
Multiple Modalities For Improving Search Performance
We briefly group the related works for visual search reranking into two categories: recurrent pattern mining and multimodality fusion. The former assumes the existence of common patterns among relevant documents for reranking. The later predicts or learns the contribution of a modality in search reranking. The rapid development of Web 2.0 technologies has led to […]
Processing the prediction queue and sending PRED ACK or raw data
Cloud computing offers its customers an economical and convenient pay-as-you-go service model, known also as usage-based pricing . Cloud customers1 pay only for the actual use of computing resources, storage, and bandwidth, according to their changing needs, utilizing the cloud’s scalable and elastic computational capabilities. In particular, data transfer costs (i.e., bandwidth) is an important […]
Heuristic load balancing Method for improving the task scheduling
SOC is different from the traditional Grid model (including P2P desktop Grid) in the resource consumption manner. Grids generally assume exclusive resource usage to ensure user QoS. The problem of job scheduling in Grids is usually categorized as a multiprocessor scheduling (MPS) problem (a kind of combinatorial optimization problem), which has been proved to be […]
Visual cryptography is a secret sharing scheme
Visual cryptography (VC) is a secret sharing scheme, based on black and white or binary images. Secret images are divided into share images which, on their own, reveal no information of the original secret. Shares may be distributed to various parties so that only by collaborating with an appropriate number of other parties, can the […]
SOCIAL NETWORK ANALYSIS-BASED MOBILE NODE GROUPING
The proposed cooperative packet delivery approach is related to the concept of delay-tolerant networks (DTNs), in this section, we review the related work on delay tolerant and cooperative data transmission in wireless networks. DTNs are characterized by long transmission delay, high error rates, intermittent connectivity, and existence of multiple unreliable links . Vehicular delay tolerant […]
- « Previous Page
- 1
- …
- 42
- 43
- 44
- 45
- 46
- …
- 108
- Next Page »