Along with the explosion of information collected by organizations in many realms ranging from business to government agencies, there is an increasing need for inter-organizational information sharing to facilitate extensive collaboration. While many efforts have been devoted to reconcile data heterogeneity and provide interoperability, the problem of balancing peer autonomy and system coalition is still […]
An effective technique to monitor activities in wireless infrastructure networks
The problem of maximizing QoM in multi-channel infrastructure wireless networks with different a priori knowledge. Two different models are considered, which differ by the amount (and type) of information available to the sniffers. Wireless usage spans a diverse set of QoS requirements from best-effort data services, to VOIP and streaming applications. The task of managing […]
DPMFP: Feature Partitions based document clustering
This paper proposes a DPMFP method for document clustering. This paper attempt to group documents into an optimal number of clusters while the number of clusters K is discovered automatically. Develop a Dirichlet Process Mixture (DPM) model to partition documents. There are two algorithms to infer DPM parameters, in particular, the variational inference algorithm and […]
Task Scheduling and Software Project Planning Using ACO
The rapid development of the software industry, software companies are now facing a highly competitive market. To succeed, companies have to make efficient project plans to reduce the cost of software construction It is in medium to large-scale projects, the problem of project planning is very complex and challenging. For scheduling and staffing management, similarly […]
A Coalitional Game Approach Hybrid Wireless Networks in Cooperative packet Delivery
WIRELESS communications and networking technology is the key to supporting a variety of applications such as the safety and emergency notification and infotainment applications a coalitional game framework for carry-and-forward-based cooperative packet delivery to mobile nodes in a hybrid wireless network. The mobile nodes are rational to form coalitions to maximize their individual payoffs. A […]
Secure Routing Protocol Using MANET’S
RAPID development of Mobile Ad Hoc Networks (MANETs) has stimulated numerous wireless applications that can be used in a wide number of areas such as commerce, emergency services, military, education, and entertainment. MANETs feature self-organizing and independent infrastructures. Through traffic analysis, enemies may intercept transmitted packets, track our soldiers (i.e., nodes), attack the commander nodes, […]
Sq: Sequential Clustering for Privacy preserving data anonymization
This paper presents sequential clustering algorithms for anonymizing social networks. Those algorithms produce anonymizations by means of clustering with better utility than those achieved by existing algorithms. We devised a secure distributed version of our algorithms for the case in which the network data is split between several players. We focused on the scenario in […]
VM Resource Allocation Isolation Technology in Cloud System
CLOUD computing has emerged as a compelling paradigm for the deployment of ease-of-use virtual environment on the Internet. One typical feature of clouds is its pool of easily accessible virtualized resources (such as hardware, platform or services) that can be dynamically reconfigured to adjust to a variable load (scale). Cloud systems usually do not provision […]
Similarity relevance scheme for protecting data in cloud computing
Cloud computing, a critical pattern for advanced data service, has became a necessary feasibility for data users to outsource data. Controversies on privacy, It is incessantly presented as outsourcing of sensitive information including emails, health history and personal photos is explosively expanding. Traditional SSE schemes enable users to securely retrieve the cipher text, but these […]
Predictive ACKs: Reducing Latency and Operational Cost in Cloud Computing
PACK (Predictive ACKs), traffic redundancy elimination (TRE) system, designed for cloud computing customers. In this paper, we present a novel receiver-based end-to-end TRE solution that relies on the power of predictions to eliminate redundant traffic between the cloud and its end-users. In this solution, each receiver observes the incoming stream and tries to match its […]