Queueing mechanisms are major mechanisms used in variety of computer and communications systems. Their major objective is to control the system operation when it is under heavy traffic load in order to provide good and fair performance to the various users. Since these system are responsible for the resource allocation and taking care of the […]
Archives for May 2014
Itembased collaborative filtering method using Pearson Correlation Coefficient
Cloud computing is becoming popular. A number of works have been carried out on cloud computing , including performance analysis, market-oriented cloud computing, management tool, workload balance, dynamic selection, etc. Quality-of-service has been widely employed for presenting the nonfunctional characteristics of the software systems and services . QoS of cloud services can be measured from […]
Userbased collaborative filtering method using vector Similarity
Cloud computing is Internet-based computing, whereby shared configurable resources (e.g., infrastructure, platform, and software) are provided to computers and other devices as services . Strongly promoted by the leading industrial companies (e.g., Amazon, Google, Microsoft, IBM, etc.), cloud computing is quickly becoming popular in recent years. Applications deployed in the cloud environment (named cloud applications […]
Parameters an Analytic hierarchy process
A Cloud service can be classified by many different factors that represent its overall performance and features. An example of a classification of such factors is provided by the Service Measurement Index (SMI) . The SMI framework summarizes the most important QoS attributes for Cloud offerings on a high level, such like Accountability, Agility, and […]
Migration Decision Support System
The increasing domination of Cloud computing solutions in the software market means that existing applications may need to migrate to this environment, in order to reap the benefits of reduced infrastructural costs and dynamic access to computational resources. While applications have already started being developed specifically for the Cloud (forming Cloud-native applications), existing systems must […]
Limitation on Possible Duplicate Relaying
A simple and provably secure encryption allowing encrypted data to be efficiently and additively aggregated. Only a modular addition is needed for cipher-text aggregation. Scheme security is based on the in distinguish ability property of a pseudorandom function (PRF), a standard cryptographic primitive. It was proved that aggregation based on this can efficiently compute statistical […]
POSITION-BASED OPPORTUNISTIC ROUTING
Wireless sensor networks (WSNs) and MOBILE ad hoc networks (MANETs) are used increasingly in many applications like wild habitat monitoring, forest fire detection, and military surveillance. After deployment in the field sensor nodes organize themselves into a multihop network, the base station being the central control point. Usually sensor nodes are greatly hampered by due […]
Sybil defender Is Efficient and Scalable To Large Social Networks
One promising way to defend against sybil attacks in social networks is to leverage the social network topologies. Decentralized algorithms, SybilGuard and SybilLimit to determine whether a suspect node is Sybil or not. SybilGuard and SybilLimit both rely on the assumption that social networks are fast mixing (explained later), and the number of attack edges […]
A sybil defense Mechanism that leverages the network topologies
Distributed systems are vulnerable to sybil attacks , in which an adversary creates many bogus identities, called Sybil identities, and compromises the running of the system or pollutes the system with fake information. The sybil identities can “suppress” the honest identities in a variety of tasks, including online content ranking, DHT routing, file sharing, reputation […]
Supporting real attribute values with small precisions
we have been witnessing much interest in uncertain data management in many application areas such as data cleaning , sensor networks , information extraction , etc. Much research effort has been devoted to several aspects of uncertain data management, including data modeling , skyline queries, top-k queries, nearest neighbor search , spatial queries , XML […]