The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The emergence of large-scale graph data has posed essential challenges for processing them efficiently. The fundamental step for effectively processing the graph is to partition the graph and distribute the relevant parts on multiple workers for parallel computing. The existing partition strategies may suffer from the following problems: 1) They ignore the certain application features, making the...
Researchers in service computing area introduce the service Skyline to optimize web service selection. It can eliminate those low-quality web services for large amounts of candidates and return a much smaller and high-quality set to the user. But there is one obvious limitation for these work that they can only compute Skyline on one combination of QoWS parameters. However, in practical, different...
Tor is a famous anonymity communication system for preserving users' online privacy. It supports TCP applications and packs application data into encrypted equal-sized cells to hide some private information of users, such as the running application type (Web, P2P, FTP, Others). The known of application types is harmful because they can be used to reduce the anonymity set and facilitate other attacks...
The ability to offer and guarantee QoS to grid customers is of utmost importance for grid service providers. Due to the very uneven performance of grid resources over time and the unpredictable requirement of customers for grid service, the run-time QoS support is required to exploit a certain degree of self-management, or in other words to be partially autonomic. In this paper, a new approach, called...
To enhance security in distribute networks, it is necessary to evaluate trustworthiness of service and help selecting a proper supplier. Many probabilistic trust models have been developed, such as Beta distribution for single dimensional trust model, Dirichlet distribution for multi-dimensional trust model. But most of them are based on certain probability distribution, which are not always accurate...
Due to the nowadays increasing applications of grid computing technology, the risks of grid security are growing, such as the problem of access control inter-domain in grid environment. Recently, trust management is considered as an effective approach for enhancing grid security. As the fuzzy feature of trust and the advantage of fuzzy theory for trust representation and reasoning, this paper presents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.