Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks

Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks Abstract Making new connections according to personal preferences is a crucial service in mobile social networking, where an initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all the users directly publish their complete profiles for others

PMSE A Personalized Mobile Search Engine

PMSE A Personalized Mobile Search Engine Abstract We propose a personalized mobile search engine, PMSE, that captures the users’ preferences in the form of concepts by mining their clickthrough data. Due to the importance of location information in mobile search, PMSE classifies these concepts into content concepts and location concepts. In addition, users’ locations (positioned

Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

Optimizing Cloud Resources for Delivering IPTV Services through Virtualization Abstract Virtualized cloud-based services can take advantage of statistical multiplexing across applications to yield significant cost savings to the operator. However, achieving similar benefits with real-time services can be a challenge. we seek to lower a provider’s costs of real-time IPTV services through a virtualized IPTV

Optimal Multi server Configuration for Profit Maximization in Cloud Computing

Optimal Multi server Configuration for Profit Maximization in Cloud Computing Abstract As cloud computing becomes more and more popular, understanding the economics of cloud computing becomes critically important. To maximize the profit, a service provider should understand both service charges and business costs, and how they are determined by the characteristics of the applications and

NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Abstract Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years.Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scaleDistributed Denial-of-Service (DDoS). DDoS attacks usually

Multimedia Fusion With Mean-Covariance Analysis

Multimedia Fusion With Mean-Covariance Analysis Abstract The number of multimedia applications has been increasing over the past two decades. Multimedia information fusion has therefore attracted significant attention with many techniques having been proposed. However, the uncertainty and correlation among different information sources have not been fully considered in the existing fusion methods. In general, the

Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Abstract With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue,

Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm

Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm Abstract Distributed networked control systems (D-NCS) are vulnerable to various network attacks when the network is not secured; thus, D-NCS must be well protected with security mechanisms (e.g., cryptography), which may adversely affect the dynamic performance of the D-NCS because of limited

Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks

Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Abstract Wireless Sensor Networks (WSNs) are increasingly used in data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit all the data generated within an application’s lifetime to the base station despite the fact that sensor

Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework

Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework Abstract We consider the problem of parameter estimation in statistical models in the case where data are uncertain and represented as belief functions. The proposed method is based on the maximization of a generalized likelihood criterion, which can be interpreted as a degree of