The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Collaborative filtering (CF) is widely used in recommendation systems. A user can get good recommendations only when both the user himself/herself and other users actively participate, i.e. providing sufficient rating data. However, due to the rating cost, rational users tend to provide as few ratings as possible. Therefore, there exists a trade-off between the rating cost and recommendation quality...
In this paper, we propose a Versatile Searchable File System, VSFS, which builds POSIX-compatible namespace using a novel Namespace-based File Query Language (NFQL). This enables analytics applications to utilize VSFS high-performance file-search service without changing their data model. VSFS versatile file-indexing mechanism is designed to offer great flexibility for applications to control indices...
Recent years have witnessed video-on-demand (VoD) as an efficient means for providing reliable streaming service for Internet users. It is known that peer-assisted VoD systems, such as NetFlix and PPlive, generally incur a lower deployment cost in terms of server bandwidth consumption. However, some fundamental issues still need to be further clarified, particularly for VoD service providers. In particular,...
SQL injection exploits the weakness of server, causing damage to database and threating the benefit of both corporations and individuals. SQL injection attack is still one of the most serious security threats. This paper proposes a method with static analysis and dynamic monitor to detect SQL injection attacks. Comparing to the current tools, this tool can compute danger degree of user input and classify...
Data deduplication techniques are ideal solutions for reducing both bandwidth and storage space requirements for cloud backup services in data centers. Current data deduplication solutions rely on comparing fingerprints (hash values) of data chunks to identify redundant data and store the fingerprints on a centralized server. This approach limits the overall throughput and concurrency performance...
We recently presented a highly advantageous DCN architecture that supports on-demand, run-time topology malleability using WDM and optical space/wavelength switching technologies. We further investigate some implementation-related issues including scalability, hop-by-hop latency and optical power budget.
Flash memory SSDs pose a well-known challenge, that is, the erase-before-write problem. Researchers try to solve this inherent problem from two different angles by either designing sophisticated Flash Translation Layer (FTL) schemes to postpone and minimize erasures or designing flash-aware buffer management algorithms to absorb unnecessary erasures. Our experimental results show that buffer management...
At present, most of Web applications have multi-tier architectures. The Web application contains many components, which makes it become component-based Web application. This paper focuses on this kind of Web applications and constructs three dependency graphs based on structure relations and message call relations. Then we improve the path-based integration testing method, propose an extended MM-path...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.