In this paper, we introduce the first application of the belief propagation algorithm in the design and evaluation of trust and reputation management systems. We approach the reputation management problem as an inference problem and describe it as computing marginal likelihood distributions from complicated global functions of many variables. However, we observe that computing the […]
Archives for October 2012
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significant research efforts in this direction, some fundamental questions still remain unaddressed: In the presence of cheating beacon nodes, what are the necessary and sufficient conditions to guarantee a bounded […]
Best Project Center in Trichy, IEEE Project Center trichy, N0 1 Project Center in Trichy, Final Year Projects
IEEE 2012 / IEEE 2013 / IEEE 2014 / IEEE 2015 SEABIRDS SOLUTION is one of the leading Research & Development Centre in trichy and chennai. We offer you the wide range of technical training in both software and hardware. Latest news for the Students who seeking for their final year projects, realtime projects, realtime […]
Balancing the Trade-Offs between Query Delay and Data Availability in MANETs
In mobile ad hoc networks (MANETs), nodes move freely and link/node failures are common, which leads to frequent network partitions. When a network partition occurs, mobile nodes in one partition are not able to access data hosted by nodes in other partitions, and hence significantly degrade the performance of data access. To deal with this […]
Logoot-Undo: Distributed Collaborative Editing System on P2P Networks
Peer-to-peer systems provide scalable content distribution for cheap and resist to censorship attempts. However, P2P networks mainly distribute immutable content and provide poor support for highly dynamic content such as produced by collaborative systems. A new class of algorithms called CRDT (Commutative Replicated Data Type), which ensures consistency of highly dynamic content on P2P networks, […]
Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
With many potential practical applications, content-based image retrieval (CBIR) has attracted substantial attention during the past few years. A variety of relevance feedback (RF) schemes have been developed as a powerful tool to bridge the semantic gap between low-level visual features and high-level semantic concepts, and thus to improve the performance of CBIR systems. Among […]
Image Super-Resolution With Sparse Neighbor Embedding
Until now, neighbor-embedding-based (NE) algorithms for super-resolution (SR) have carried out two independent processes to synthesize high-resolution (HR) image patches. In the first process, neighbor search is performed using the Euclidean distance metric, and in the second process, the optimal weights are determined by solving a constrained least squares problem. However, the separate processes are […]
Detecting and Resolving Firewall Policy Anomalies
The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most […]
Opportunistic Flow-Level Latency Estimation Using Consistent NetFlow
The inherent measurement support in routers (SNMP counters or NetFlow) is not sufficient to diagnose performance problems in IP networks, especially for flow-specific problems where the aggregate behavior within a router appears normal. Tomographic approaches to detect the location of such problems are not feasible in such cases as active probes can only catch aggregate […]
Information Theoretic Aspects of Users Activity in a Wyner-Like Cellular Model
We address an application of multiuser information theory to the study of the uplink of a communication system with randomly activated users. We first assume that all the messages are jointly decoded by a multicell processor. Then, we relax this hypothesis and study the network under the assumption that the decoding of the message of […]