Cloud computing is becoming popular. A number of works have been carried out on cloud computing , including performance analysis, market-oriented cloud computing, management tool, workload balance, dynamic selection, etc. Quality-of-service has been widely employed for presenting the nonfunctional characteristics of the software systems and services . QoS of cloud services can be measured from […]
Limitation on Possible Duplicate Relaying
A simple and provably secure encryption allowing encrypted data to be efficiently and additively aggregated. Only a modular addition is needed for cipher-text aggregation. Scheme security is based on the in distinguish ability property of a pseudorandom function (PRF), a standard cryptographic primitive. It was proved that aggregation based on this can efficiently compute statistical […]
POSITION-BASED OPPORTUNISTIC ROUTING
Wireless sensor networks (WSNs) and MOBILE ad hoc networks (MANETs) are used increasingly in many applications like wild habitat monitoring, forest fire detection, and military surveillance. After deployment in the field sensor nodes organize themselves into a multihop network, the base station being the central control point. Usually sensor nodes are greatly hampered by due […]
A sybil defense Mechanism that leverages the network topologies
Distributed systems are vulnerable to sybil attacks , in which an adversary creates many bogus identities, called Sybil identities, and compromises the running of the system or pollutes the system with fake information. The sybil identities can “suppress” the honest identities in a variety of tasks, including online content ranking, DHT routing, file sharing, reputation […]
Supporting real attribute values with small precisions
we have been witnessing much interest in uncertain data management in many application areas such as data cleaning , sensor networks , information extraction , etc. Much research effort has been devoted to several aspects of uncertain data management, including data modeling , skyline queries, top-k queries, nearest neighbor search , spatial queries , XML […]
Dynamic Programming Algorithm for Attributelevel Model
Aggregate (or aggr for short) queries, in particular SUM queries, are crucial for many applications that need to deal with uncertain data . Let us give two motivating examples from the medical and environmental domains. Effect of the number of uncertain tuples using the synthetic data, the response time of the three algorithms vs. the […]
Topological Conditions For Stabilization Versus Information Transmission
With recent revolutions in sensor and actuator technologies, availability of powerful but inexpensive embedded computing and introduction of new multi-hop wireless network standards for industrial automation, control over wireless networks is becoming a disruptive technology. Traditional wired interconnections between the plant sensors, controllers and actuators can be replaced by wireless multi-hop mesh networks, yielding cost […]
Improving resource utilization For data centers that run parallel jobs
There have been many efforts on scheduling mechanisms for parallel jobs in clusters . FCFS is the basic but popularly used batch scheduling algorithm. Backfilling , which was developed as the EASY for IBM SP1, is a technique that allows short/small jobs to use idle nodes while the job at the head of the queue […]
Constructing a Global UP Tree by Applying DGU and DGN
DATA mining is the process of revealing nontrivial, previously unknown and potentially useful information from large databases. Discovering useful patterns hidden in a database plays an essential role in several data mining tasks, such as frequent pattern mining, weighted frequent pattern mining, and high utility pattern mining. Among them, frequent pattern mining is a fundamental […]
Relative CTRs at different positions in random learning bucket
A few action-interpretation-based approaches including user segmentation, user engagement and position bias. The success of user segmentation for personalization is due to the fact that the proposed clustering algorithms actually group users by interests and preferences that are implicitly demonstrated by their behaviors. Once the interest patterns are determined by clustering algorithms, a user will […]
- 1
- 2
- 3
- 4
- Next Page »