The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SNS (social network service) is becoming more and more popular on the web, and it is even more so for Mobile Internet browsing. The huge success of foursquare on the web shows that introducing LBS (location based service) to mobile Internet is promising. With LBS, mobile device (client) needs to commit user's location information as a request to the remote server (server). The server receives the...
Recently, one of the most popular applications on the Internet is the social networking, such as, Facebook and Twitter. Finding resources using recent Peer-to-Peer (P2P) schemes in a social network has limits, such as distance problem between peers etc. So, in this paper, we present an efficient social P2P management scheme based on interesting keywords. We compare our proposal with the recent P2P...
Online social networks (OSNs) are immensely popular, but their centralized control of user data raises important privacy concerns. This paper presents Vis-à-Vis, a decentralized framework for OSNs based on the privacy-preserving notion of a Virtual Individual Server (VIS). A VIS is a personal virtual machine running in a paid compute utility. In Vis-à-Vis, a person stores her...
In recent years there has been a trend for more user participation in Internet-based services leading to an explosion of user-generated, tailored, and reviewed content and social-networking- based applications. The next generation of applications will continue this trend and be more interactive and distributed, putting the prosumers at the center of a massively multiparticipant communications environment...
Measuring trust among social network users is an important research issue. In this paper, we present a new trust model based on emails. We name this new trust model as Email Trust (EMT). EMT is constructed based on the interactions among users via their daily emails, which provides a level of belief on the data transmitted by a use. In EMT, we require each user to perform a trust checking procedure...
In this paper, we propose a method to evaluate effectiveness of our proposed context-aware text entry by using Twitter. We focus on ”geo-tagged” public tweets because they include user's important contexts, real location and time. We also focus on TV program listing because 50% traffic of iPhone in Japan is generated from our home, in which I often tweets in watching a TV. Cyclical collecting system...
Online Social Networks (OSNs) are more and more popular recently, people may through them interact with each other for the purpose of social intercourse. The client/server OSN architecture brings about the bottleneck of bandwidth and computation. It leads to the scalability problem and the communication latency increases as users grows. This paper proposes a bandwidth- and latency-aware peer-to-peer...
The myExperiment social website for sharing scientific workflows, designed according to Web 2.0 principles, has grown to be the largest public repository of its kind. It is distinctive for its focus on sharing methods, its researcher-centric design and its facility to aggregate content into sharable `research objects'. This evolution of myExperiment has occurred hand in hand with its users. myExperiment...
This paper provides a performance study for securing media streaming based on hash chain methodology. We introduce a new technique that combines the signature of window-based hash chain with redundancy codes for achieving high reliability and robustness against many attacks. Also, the Window technique integrates the Time-Stamped which strongly eliminates the anti-replay attack. It will also control...
This paper presents a cooperative object caching mechanism for maintaining high content availability in Social Wireless Networks. Most of the existing cooperative caching schemes in wireless networks provide either high network level availability or high node level availability, but not both at the same time. The first one ensures object availability in isolated network partitions and the second one...
Advances in the Internet technologies, specifically Web 2.0, have brought about richer Internet contents and applications. Although recent reports have shown increase of the Internet use by Thai citizens, Web-2.0-based websites in Thailand still do not keep pace very well that would permit full benefits of the technologies to be reaped. This paper presents the design and implementation of a Web 2...
In the past few years, social networking websites such as Facebook and Myspace become very popular. The usage rage of social networking websites even exceeds that of Google. Followed by the popularity is many potential networking threats. How to prevent and improve these threats to avoid their expansion has become a major challenge. This paper categorizes social networking websites into three main...
In this paper, we analyze an anonymized packet trace of mobile handset data traffic from a major European mobile Internet Service Provider (ISP). Our goal is to understand the effect of the differences between this traffic and the traffic in wired residential networks. This knowledge can be useful for adapting the network to specific mobile usage. We show that, compared to wired users, mobile users...
In this paper, we present a comprehensive trust model using emails. A bootstrapping trust model - Email Trust (EMT) - in pervasive communication environments. EMT focuses on email-based social network trust, which provides a level of belief on the data transmitted by an entity. To achieve the email-based social network trust, we require each user to perform a trust checking procedure and process a...
Mobile Social Network Service has been broadly researched on nowadays, however few people tries to explain the essence of MSNS, which leads to no common architecture for MSNS system. Consequently, in this article we compares the Mobile Social Network Service (MSNS) with the Social Network Service (SNS) in several aspects and present a perspective on future vision of mobile social network by analyzing...
Currently, with the 3G technology, the mobile internet is gradually entering into people's life. With the rapid development of various mobile internet applications, the social life is being changed deeply. Searching information about service of life will be one of the most important applications in mobile internet. At the same time, the widespread use of mobile phones and the availability of user-location...
Although the conventional Social Network Services (SNS) provides a solution for internetworking social users to share information and social media contents based on the Web, there are further requirements to support increasing demands of social users with commencing Web 2.0 and ubiquitous computing technologies. Especially with increasing popularity of the User Created Contents (UCC) and handheld...
Large corporations such as Amazon, Google, Microsoft, and Yahoo, use data centers to keep up with the growing demand for communication-hungry Internet services like image and video sharing, social networking, and searching. We study the problem of actually allocating the memory of servers in a data center based on online requests for storage. Given an online sequence of storage requests and a cost...
This paper presents a mobile phone application which brings two new features into social networks: an advertising service and a location based service. With this application, mobile operators will play a central role in an advertising chain comprising businesses, mobile operators and online communities. Thus, the mobile phone becomes a powerful tool to share consumer and travelers experiences. This...
Social networking sites obtained a great success in the last years. Their popularity is related to changing lifestyles, where people increasingly look for new acquaintances or cultivate old friendships by means of the Internet, typically using a PC. Yet along with the rapidly increasing amount of mobile phone users, as well as the development of so-called smart phones, the possibility for creating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.