The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User request trace-oriented monitoring is an effective method to improve the reliability of cloud systems. However, there are some difficulties in getting traces in practice, which hinder the development of trace-oriented monitoring research. In this paper, we release a fine-grained user request-centric open trace data set, called Trace Bench, collected on a real world cloud storage system deployed...
The breach of privacy in encrypted instant messenger (IM) service is a serious threat to user anonymity. Performance of previous de-anonymization strategies was limited to 65%. We perform network de-anonymization by taking advantage of the cause-effect relationship between sent and received packet streams and demonstrate this approach on a data set of Yahoo! IM service traffic traces. An investigation...
Emergence of honeynet, which is a network of honeypots, has changed the phase of internet security and information gathering about intruders. In improving deception of the honeynet which in turn increases the workload of attackers, most honeynet deployments are geared towards improving on the deception deal by using MAC addresses, IP addresses and protocols on host machine. Attackers gain access to...
Social networking applications are changing the way people communicate with their peers and family. Social networking applications have several features that help in connecting one to another, from finding old friends to browsing for new friends and contacts. To harness the true power of social networking, sometimes it may be important to seamlessly identify and connect individuals who are geographically...
Broadcast Searchable Keywords Encryption (BSKE) is a novel scheme that allows searching in encrypted data without knowing a secret key. Consider Bob wants to encrypt the same data under master public key for a group of users and stores this encrypted data with Alice, Malice is one of those recipients he asks Alice using his private key whether or not she has stored encrypted data, then Alice will...
Sentiment lexicons are useful to automatically extract sentiment from text. In this paper, we generate several Norwegian sentiment lexicons by extracting sentiment information from two different types of Norwegian text corpus, namely, news corpus and discussions forums. The methodology is based on the Point wise Mutual Information (PMI). We introduce a modification of the PMI that considers small...
As education and technology merge, the diversity of teaching and learning methods expand even more. Virtual labs are a set of web applications containing learning materials that compliment the various courses in an Engineering curriculum. The primary intent of the virtual labs is to provide in-lab experience to their users even when the physical lab infrastructure is not available. In this paper,...
The college students are outstanding contemporary youth, and the universities are source of various social trend of thought. It is a big challenge for the college educational workers to cultivate the college students of healthy, upward characters. However, the traditional teaching methods cannot meet the requirements and get an expected result. To solve these problems, a cultural transmission platform...
In traditional Online Examination System, only objective type questions are assessed and according to that marks are given to the student. However, this technique lacks the capability of evaluating descriptive answers. In university examinations, there are many types of question included for evaluation of the students. Therefore, the automated system must be capable of evaluating the descriptive answers...
In road networks, k-Range Nearest Neighbor (kRNN) queries locate the k-nearest neighbors for every point on the road segments that are within a given query region, based on the network distance. This is an important task, because the user's location information may not be accurate, furthermore, users may be unwilling to reveal their exact location for privacy reasons. Therefore, in this specific situation,...
To find a specialty-counterpart, diagnosis-accurate, skill-superb, reputation-high, and meanwhile cost-effective and distance-close doctor is always essential for patients but not an easy job. According to various categories of medical professions, the diversity of user symptoms, and the information asymmetry and incompetence of doctors' profiles as well as patients' medical history, today most recommender...
Since the number of potential malicious URLs from diverse sources is large, URL deduplication is needed for the efficient identification of malicious websites. URL Deduplicationas-a-Service (UDaaS) was developed to help a URL analyst to deploy and manage a cloud-based distributed and parallel URL deduplication infrastructure easily, this can improve the performance of malicious websites detection...
Mobile users access location services from a location based server. While doing so, the user's privacy is at risk. The server has access to all details about the user. Example the recently visited places, the type of information he accesses. We have presented synergetic technique to safeguard location privacy of users accessing location-based services via mobile devices. Mobile devices have a capability...
Energy consumption for Cloud providers and data centers is a major problem. Dynamic Power Management is a common solution to this problem, switching off and on idle servers as needed. However, failing to predict the impact of switching costs may adversely affect energy and/or SLA violations. This paper contributes a policy that adaptively decides when to switch servers on and off under a workload...
Mobile applications are widely used in many research areas as well as in current daily life. Applications on smart phones are closely related to the physical device. An application may run differently on different mobiles. It is hard and expensive for college students to adapt and test their applications on several types of smart phones. This paper presents a work in progress on the development of...
This paper presents the design process and testing of NaVaSH, a stand-alone software application for conducting online exams. Initially, it starts with depiction of various related softwares and later RGUKT Examination System has taken as the basis and survey results were presented. Next the detailed description of NaVaSH modules along with their new features has explained with the help of intermediate...
A major issue faced by the education system in highly populated countries like India is the shortage of experienced and trained teachers and trainers. In order to alleviate this issue, we describe how the e-Learning tool AVIEW is being used for large-scale online training and teaching. A-VIEW allows thousands of participants at various geographical locations to be trained and taught at the same time...
Collaborative filtering (CF) over large datasets requires significant computing power. Due to this data owning organizations often outsource the computation of CF (including some abstraction of the data itself) to a public cloud infrastructure. However, this leads to the question of how to verify the integrity of the outsourced computation. In this paper, we develop verification mechanisms for two...
Cloud computing is a new paradigm to deliver computing resources to customers in a pay-as-you-go model. In this paper, the recently emerged container-based virtualization technology is adopted for building the infrastructure of a cloud data center. Cloud providers are concerned with the resource usage in a multi-type resource sharing environment while cloud customers desire higher quality of services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.