The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Using a broadcast channel to transmit clients' data requests may impose privacy risks. In this paper, we tackle such privacy concerns in the index coding framework. We show how a curious client can infer some information about the requests and side information of other clients by learning the encoding matrix used by the server. We propose an information-theoretic metric to measure the level of privacy...
This paper discusses the utilization of SDN/NFV as enabling technology for the provision of in-service video quality assessment. The proposed method is based on a reduced reference extension of the widely used full reference SSIM metric, proving how the applicability of SDN/NFV can support the development of novel value-added service. The proposed video quality assessment method is based on a two-step...
In increasingly popular participatory sensing systems, new challenges are arising to select the most appropriate participants when considering their hand-held smart device's different energy conditions, uncontrollable mobility pattern, and associated sensing capabilities to best satisfy the quality-of-information (QoI) requirements of sensing tasks. This paper proposes a QoI-aware energy-efficient...
In P2P (Peer-to-Peer) VoD (Video-on-Demand) systems, one of the key problems is cache replication. However, with the large scale P2P VoD systems deployed, people study on the log of these systems and gradually realize that the strategy which caches videos proportionally to their popularities is not optimal, especially for cold resources. In simulation, we show that cold videos produce the majority...
Anycast communication is gaining much interest due to the deployment and the growing importance of new network services, including Content Delivery Networks (CDNs) and grid/cloud computing, among others. Concurrently, elastic optical networks (EONs), being a very promising solution for future optical transport networks, are considered as effective and cost-efficient approach for supporting such bandwidth-demanding...
In recent years, due to the appealing features of cloud computing, large amount of data have been stored in the cloud. Although cloud based services offer many advantages, privacy and security of the sensitive data is a big concern. To mitigate the concerns, it is desirable to outsource sensitive data in encrypted form. Encrypted storage protects the data against illegal access, but it complicates...
Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. The first offered cloud service is moving data into the cloud. data owners let cloud service providers host their data on cloud servers and data consumers can access the data from the cloud servers. This new paradigm of data storage service also...
Recent botnets such as Conficker, Kraken, and Torpig have used DNS-based “domain fluxing” for command-and-control, where each Bot queries for existence of a series of domain names and the owner has to register only one such domain name. In this paper, we develop a methodology to detect such “domain fluxes” in DNS traffic by looking for patterns inherent to domain names that are generated algorithmically,...
In this paper, evolutionary algorithms are explored with the objective of demonstrating that they offer the most efficient and adequate solution to the Index Selection Problem (ISP). The final target is to develop a self-tuning database system requiring little (or no) intervention from experts in physical design. Following the evaluation of the proposal and the discussion of experimental results,...
With increasing denial of service attacks on network infrastructure, there is an urgent need to develop technique to assess the threat of attacks on network security online. A novel model of security threat assessment relying on several predefined metrics of network performance is proposed to measure the impact of denial of service attacks on service availability in real time. This model applies the...
In this paper, we propose a new preemptive scheduling algorithm which belongs to a new family of real-time service oriented scheduling problems. As the complementarity of our previous non-preemptive algorithm, real time tasks are scheduled preemptively with the objective of maximizing the total utility this time. Different from the traditional utility accrual scheduling problem that each task is associated...
The goal of this paper is to minimize service disruption, a unique phenomenon in peer-to-peer (P2P) streaming system and the major contributing factor to degrade user experience. In order to improve its streaming quality and stability, a P2P system should select peers with abundant bandwidth resource and prospect longevity as the parents of other peers. Towards this end, we propose PRW (peer resilient...
The compression and throughput performance of data deduplication system is directly affected by the input dataset. We propose two sets of evaluation metrics, and the means to extract those metrics, for deduplication systems. The First set of metrics represents how the composition of segments changes within the deduplication system over five full backups. This in turn allows more insights into how...
IPTV has been hailed as a “killer app” of the Internet for a long time, but it has yet to really make a major breakthrough, due to various technical and political reasons. The recent influx of community-driven video distribution has re-actualized the research into efficient distribution methods for streaming video. In this paper, we suggest a number of modifications and extensions to the BitTorrent...
In this paper, we propose a clustering scheme for unstructured P2Ps based on the notion of ``tit-for-tat'' strategy. The proposed scheme is a combination of an identification of critical links, local reconfiguration of incident links, and a retaliation rule. By adopting such a tit-for-tat strategy in selecting incident links to be disconnected while reconfiguring the underlying P2P overlay, it emerges...
Services that offer users the possibility of transmitting their own live streaming video content, using Web 2.0-based platforms, are increasing in popularity. In this context, we propose and evaluate solutions that contribute to improve the scalability of this type of system. This work encompasses two major steps. First, we collected data from a popular online live video sharing service, and provide...
Recent few years, many p2p VoD softwares are widely applied through out the Internet, which gives us an opportunity to study user watching behavior of p2p VoD system at large scale. Many previous works on this area directly regard peer's information transmitting log such as buffer message as peer's watching behavior log. However, the effect of prefetch strategy is not considered. In this paper, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.