The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the era of Internet and electronic devices bullying shifted its place from schools and backyards into the cyberspace; it is now known as Cyberbullying. Children of the Arab countries are suffering from cyberbullying same as children worldwide. Thus concerns from cyberbullying are elevating. A lot of research is done for the purpose of handling this situation. The current research is focusing on...
It is well known that load balancing and low delivery communication cost are two critical issues in mapping requests to servers in Content Delivery Networks (CDNs). However, the trade-off between these two performance metrics has not been yet quantitatively investigated in designing efficient request mapping schemes. In this work, we formalize this trade-off through a stochastic optimization problem...
Named Data Networking (NDN) is a promising Future Internet architecture to support efficient content distribution. Specifically, P2P may gain benefits from NDN, as NDN inherently provides a flexible forwarding plane for multi-source and multi-path communications. Existing studies in this area have proposed solutions, but these are adversely affected by link latency. This leads to illogical resource...
Network attacks are becoming ever more sophisticated and are able to hide more easily in the increasing amount of traffic being generated by everyday activity. Administrators are placed in the unfortunate position of distinguishing between the two. The attack graph has been in use for some time because it provides a concise knowledge representation, and has had successful security metrics developed...
Nowadays, password-based authentication is one of the most widely used methods to authenticate a user before granting accesses to secured websites. Password reuses within the same website and across multiple ones can enable shadow attacks. In this project, we study web password reuses by analysing a large number of sample data and combine dynamic authentication factor to achieve better efficiency...
In order to be considered as Linked Data, the datasets on the web must be linked to other datasets. Current studies on dataset interlinking prediction researches do not distinguish the type of links, which are of less help for real application scenarios, as dataset publishers still do not know what kinds of RDF links can be established and furthermore how to configure the data linking algorithms....
This paper presents a low-complexity approach for calculating soft decision metrics of polar coded quadrature amplitude modulation (QAM) system. A simple and general bit log likelihood ratio (LLR) expression is provided for Gray coded QAM signals. The characteristics of Gray code mapping such as symmetries and repeated formats of the bit assignment in a symbol among bit groups, are exploited effectively...
Distributed systems consist of several heterogeneous computing devices. In such systems, the total cost of ownership (TCO) includes capital expenditure such as purchasing of equipment like servers, switches, etc. and operational expenditure such as human salary, electricity bills, etc. Thusly, power consumption is a big portion of operational expenditure. The high rate of power wastage is directly...
Nowadays recommender systems are developed to provide information for users to choose the best things that they want. Recently different collaborative filtering techniques have been successfully employed to provide precise recommendations. However, sparsity problem is still considered as an important remained challenges. Existing CF based recommendation methods generally focus on positive similarities...
Various techniques have been proposed to detect smells in spreadsheets, which are susceptible to errors. These techniques typically detect spreadsheet smells through a mechanism based on a fixed set of patterns or metric thresholds. Unlike conventional programs, tabulation styles vary greatly across spreadsheets. Smell detection based on fixed patterns or metric thresholds, which are insensitive to...
Systems-on-a-chip (SoC) represents a rupture on the traditional HPC infrastructure and started to be adopted together OS-level virtualization to provide services in Fog and Edge computing scenarios. In this work, we analyzed the performance of OS-level virtualization solutions - Linux Containers (LXC) and Docker - for HPC activities running in SoC systems in order to discover how OS-level virtualization...
In today's cloud computing platforms, more and more users are now working or collaborating in multi-cloud environment, in which collaborators, clouds, computing nodes may belong to different institutions or organizations. Those different organizations might have their own policies. Security is still a big concern in cloud computing. To help cloud vendors and customers to detect and prevent from being...
In [1]–[3], the concept of perfect location privacy is defined and sufficient conditions for achieving it were obtained when anonymization is used. In this paper, necessary conditions for perfect privacy are obtained. Specifically, we prove that the previous sufficient bounds are tight, and thus we obtain the threshold for achieving perfect location privacy using anonymization. First, we assume that...
We consider a class of mixed integer programs where the problem is convex except for a vector of discrete variables. Two methods based on the Alternating Direction Method of Multipliers (ADMM) are presented. The first, which has appeared in the recent literature, duplicates the discrete variable, with one copy allowed to vary continuously. This results in a simple projection, or rounding, to determine...
Volume estimates of metric balls in manifolds find diverse applications in various applied sciences including information theory and coding theory. In this paper, the focus is on the exact volume of metric balls in real Grassmann manifold, extending recent results of the complex case. Firstly, we formulate the exact volume as a multi-dimensional integral, which is then represented as an inverse Laplace...
Our previous work [1] defined the notion of perfect location privacy for location-based services (LBS) and demonstrated how it can be achieved under basic user models. In this paper, we extend our work by studying perfect location privacy within a more complex scenario in which a user's movements are dependent upon the time domain. We model a mobile user's path using Markov chains and show that perfect...
Building program analysis tools is hard. A recurring development task is the implementation of the meta-model around which a tool is usually constructed. The XCORE prototype supports this task by generating the implementation of the meta-model. For this purpose, developers will add directly into the source code of the tool under construction some meta-information describing the desired meta-model...
Exploring the design space of the memory hierarchy requires the use of effective methodologies, tools, and models to evaluate different parameter values. Reuse distance is of one of the locality models used in the design exploration and permits analytical cache miss estimation, program characterization, and synthetic trace generation. Unfortunately, the reuse distance is limited to a single locality...
With AI celebrating its 60th anniversary, questions arise of when (not even if) a computational system will be able to understand humor. These questions open up interesting opportunities, but point out areas of research that yet are insufficient for informal human computer communication. This paper looks at computational humor as a way of verifying computational understanding of text (written or verbal)...
Quantitative risk assessment is a critical first step in risk management and assured design of networked computer systems. It is challenging to evaluate the marginal probabilities of target states/conditions when using a probabilistic attack graph to represent all possible attack paths and the probabilistic cause-consequence relations among nodes. The brute force approach has the exponential complexity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.