The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider the Threshold Activation Problem (TAP): given social network G and positive threshold T, find a minimum-size seed set A that can trigger expected activation of at least T. We introduce the first scalable, parallelizable algorithm with performance guarantee for TAP suitable for datasets with millions of nodes and edges; we exploit the bicriteria nature of solutions to TAP to allow the user...
The rapid growth of sensor-embedded smartphones has led to a new data sensing and collecting paradigm, known as crowdsensing. Many auction-based incentive mechanisms have been proposed to stimulate smartphone users to participate in crowdsensing. However, none of them have taken into consideration the Sybil attack where a user illegitimately pretends multiple identities to gain benefits. This attack...
To ensure the scalability of big data analytics, approximate MapReduce platforms emerge to explicitly trade off accuracy for latency. A key step to determine optimal approximation levels is to capture the latency of big data jobs, which is long deemed challenging due to the complex dependency among data inputs and map/reduce tasks. In this paper, we use matrix analytic methods to derive stochastic...
Social networks are the major routes for most individuals to exchange their opinions about new products, social trends and political issues via their interactions. It is often of significant importance to figure out who initially diffuses the information, i.e., finding a rumor source or a trend setter. It is known that such a task is highly challenging and the source detection probability cannot be...
Network Function Virtualization (NFV) is a promising technique to greatly improve the effectiveness and flexibility of network services through a process named Service Function Chain (SFC) mapping, with which different network services are deployed over virtualized and shared platforms in data centers. However, such an evolution towards software-defined network functions introduces new challenges...
Collapsed forwarding has long been used in cache systems to reduce the load on servers by aggregating requests for the same content. Named Data Networking (NDN) as a future Internet architecture incorporates this technique through a data structure called Pending Interest Table (PIT). The request aggregation feature suggests that PIT can be viewed as a nonreset time-to-live (TTL) based cache. The Content...
Massive trust assessment (MTA) in an Online Social Network (OSN), i.e., computing the trustworthiness of all users in the network, is crucial in various OSN-related applications. Existing solutions are either too slow or inaccurate in addressing the MTA problem. We propose the OpinionWalk algorithm that accurately and efficiently conducts MTA in an OSN. OpinionWalk models trust by the Dirichlet distribution...
In this paper, we study how to perform traffic engineering at an extremely-small time scale with segment routing, addressing a critical need for modern wide area networks. Prior work has shown that segment routing enables to better engineer traffic, thanks to its ability to program detours in forwarding paths, at scale. Two main approaches have been explored for traffic engineering with segment routing,...
Nowadays, high-bandwidth networks are easily accessible in data centers. However, existing distributed graph-processing frameworks fail to efficiently utilize the additional bandwidth capacity in these networks for higher performance, due to their inefficient computation and communication models, leading to very long waiting times experienced by users for the graph-computing results. The root cause...
Incentive-driven advanced attacks have become a major concern to cyber-security. Traditional defense techniques that adopt a passive and static approach by assuming a fixed attack type are insufficient in the face of highly adaptive and stealthy attacks. In particular, a passive defense approach often creates information asymmetry where the attacker knows more about the defender. To this end, moving...
We study learning outcome prediction for online courses. Whereas prior work has focused on semester-long courses with frequent student assessments, we focus on short-courses that have single outcomes assigned by instructors at the end. The lack of performance data makes the behavior of learners, captured as they interact with course content and with one another in Social Learning Networks (SLN), essential...
The use of asynchronous cellular automata models to remove noise from images is considered in the article. The use of cellular automata allows to simplify calculations, eliminating floating point operations, and enable parallel processing of image points.
The paper presents a model of one-dimensional finite crystal. The calculation of the field of forces acting on an electron in a crystal was done. The relationship between the electron work function and the lattice constant was obtained. Show matching between theoretical values of work function and practical data.
In this article, we investigate the role of recommender systems and their potential in the educational system. The key idea is to describe the information aggregation capabilities of a recommender system to find the best way tutoring. The recommender system presented in this article is based on building a vector space model for massive open online courses (MOOCs). We show that the resulting model...
The paper analyzes the existing methods and approaches to correcting bases of fuzzy rules of decision support systems (DSS). There was developed and implemented a two-stage method of fuzzy rule base correction for hierarchically-organized DSS with discrete logic output at variable structure of input vector. The appropriate method interactively provides reduction of database rules structure and correction...
The work is devoted to three-dimensional computer simulations of nanotube network formed in non-conductive volume and studies the electrical properties of the model network considering various types of conductivity mechanisms. Results of the simulation for nanotube networks with different geometrical parameters are presented.
In this paper are offered vector-branching diagrams for modeling the TIF processes. Analyzed properties and disadvantages of TIF methods that make it impossible to use certain methods. To solve these problems invited using of subtractive-additive TIF method. Proved effectiveness of their application, by comparing the TIF methods, and the coefficient of efficiency for different bits capacity.
The Fast ReRoute flow-based model has been improved, where the node and link protection schemes in the linear form were formulated with the implementation of single path and multipath routing strategies. The use of linear-quadratic optimality criterion was substantiated, and the system hierarchy relations of weight coefficients in the objective function were determined with the aim to ensure maximum...
Today, processing integrated information within and between enterprises is increasingly becoming more and more critical, and so is the implementation and evaluation of an Enterprise Architecture (EA). The review of literature on EA evaluation shows several issues. However, the evaluation of EAs has not attracted sufficient attention, and thus, this research area has not been explored thoroughly yet...
In contemporary IT and Internet society, Cloud computing brings a paradigm shift not only for successfully evolving large distributed software applications but also for delivering a number of innovative services and applications. Cloud computing is an umbrella enveloping several models of service, like SaaS, IaaS, PaaS, TaaS. In particular, software testing in/on/over cloud is the focus of this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.