Secret image sharing is a method for distributing a secret image amongst n data stores, each storing a shadow image of the secret, such that the original secret image can be recovered only if any k out of the n shares...
详细信息
ISBN:
(纸本)9781479900152
Secret image sharing is a method for distributing a secret image amongst n data stores, each storing a shadow image of the secret, such that the original secret image can be recovered only if any k out of the n shares is available. Existing secret image sharing schemes, however, do not support scaling and cropping operations on the shadow image, which are useful for zooming on large images In this paper, we propose an image sharing scheme that allows the user to retrieve a scaled or cropped version of the secret image by operating directly on the shadow images, therefore reducing the amount of data sent from the data stores to the user. Results and analyses show that our scheme is highly secure, requires low computational cost, and supports a large number of scale factors with arbitrary crop.
Online travel destination recommendation is to keep track of a user's current traveling history to recommend next destination in real time while the user is on the travel. This paper presents an efficient variable...
详细信息
With the development of Internet technologies, distributed and multimedia applications are more and more used. Because these applications have Quality of Service (QoS) expectations (bounded delay, guaranteed bandwidth...
详细信息
ISBN:
(纸本)9781467355506;9780769549538
With the development of Internet technologies, distributed and multimedia applications are more and more used. Because these applications have Quality of Service (QoS) expectations (bounded delay, guaranteed bandwidth, etc.), a set of QoS oriented protocols aimed at aiding end-to-end communications are proposed. Each one of these protocols offers one or several mechanisms. Selecting the best protocol with the best mechanism(s) according to the application requirements and network contexts is a challenge if we want to provide enough QoS to the final users. Also because contexts can evolve, for example when network characteristics change, the previous selected protocol can become obsolete. In this context, an adaptation is mandatory. In this paper, we show how the OSI transport layer can become autonomic in order to perform dynamically reconfiguration actions when it is needed. Our approach consists in including at the transport layer the MAPE loop of the autonomic computing proposal to monitor and analyze the communication in order to predict or to detect a QoS degradation induced by changes of network context, and to plan and execute dynamically new reconfiguration actions in order to keep the communication at the expected QoS level. To implement and evaluate our approach, we extend the new Multipath-TCP (MPTCP) protocol, which offers an extensible application oriented layer. This layer gives opportunity to deploy QoS-aware mechanisms. The test results show that the consumption time of autonomic selection and composition of these mechanisms at run time does not prevent enhancing the QoS, and encourage us to continue working in this approach.
This volume contains the papers presented at the Second International conference on Frontiers in Intelligent computing: Theory and Applications (FICTA-2013) held during 14-16 November 2013 organized by Bhubaneswar Eng...
ISBN:
(纸本)9783319029306
This volume contains the papers presented at the Second International conference on Frontiers in Intelligent computing: Theory and Applications (FICTA-2013) held during 14-16 November 2013 organized by Bhubaneswar Engineering College (BEC), Bhubaneswar, Odisha, India. It contains 63 papers focusing on application of intelligent techniques which includes evolutionary computation techniques like genetic algorithm, particle swarm optimization techniques, teaching-learning based optimization etc for various engineering applications such as data mining, Fuzzy systems, Machine Intelligence and ANN, Web technologies and multimedia applications and Intelligent computing and networking etc.
Large proliferation of mobile phone applications result in extensive use of data intensive services such as multimedia download and social network communication. With limited penetration of 3G/4G networks in developin...
详细信息
ISBN:
(纸本)9781467350778;9781467350754
Large proliferation of mobile phone applications result in extensive use of data intensive services such as multimedia download and social network communication. With limited penetration of 3G/4G networks in developing countries, it is common to use low bandwidth 2G services for data communication, resulting in larger download time and correspondingly high power consumption. In this paper, we present a system architecture, Unity, that enables collaborative downloading across co-located peers. Unity uses short range radio interfaces such as Bluetooth/WiFi for local coordination, while the actual content is downloaded using a cellular connection. Unity is designed to support mobile phones with diverse capabilities. End-to-end implementation and evaluation of Unity on Android based phones, with varying workload sizes and number of peers, show that Unity can result in multifold increase in download rate for the co-located peers. We also describe architecture of cloud-based Unity which uses principles of mobility prediction, social interactions, and opportunistic networking to make collaboration more pervasive and useful.
This paper studies the dissemination of multimedia contents in distributed social networks, which are composed of a set of smart handsets. Gossip algorithms are used to spread social multimedia contents in a decentral...
详细信息
We present a data replication framework for distributed graph processing. First we partition a graph and store each partition in a machine. Then we replicate all partitions and assign replicas to machines, where each ...
详细信息
ISBN:
(纸本)9780769550282
We present a data replication framework for distributed graph processing. First we partition a graph and store each partition in a machine. Then we replicate all partitions and assign replicas to machines, where each machine can store only a limited number of replicas. The goal is to replicate the partitions so that each partition has at least a certain number of replicated copies, and the cost is minimized. The cost is defined as the data traffic data traffic needed to run general graph processing algorithms. The cost metric is the overall transmission cost of all machines, and the maximum transmission cost of a single machine. We propose an optimal algorithm based on linear programming to solve the problem of minimizing the overall transmission cost. We also propose an optimal algorithm to solve a special problem of minimizing the maximum transmission cost of a node.
Microblogging has become commonplace and created new methods of communication, contributing significantly to information sharing. This holds since microblogging focuses on sharing content while building social relatio...
详细信息
ISBN:
(纸本)9780769550480
Microblogging has become commonplace and created new methods of communication, contributing significantly to information sharing. This holds since microblogging focuses on sharing content while building social relations among people who share the same interests and/or activities. In this context, people's perception and emotions towards a specific subject is a valuable piece of information and sentiment and affective analysis play an important role. In this paper, an affective analysis methodology is proposed, which is a lexicon-based technique, for capturing the wisdom of crowds, as well as the social pulse and the trends, through the more accurate assessment of human emotion states. The methodology adopted involves the monitoring of the emotions' intensity, i.e. how strong or weak the emotional states of the published information are. The results suggest that the proposed approach manages to efficiently capture people's emotions as these were recorded in datasets derived from Twitter.
The log file for recording events in a cloud platform is maintained by a computer server and generally contains large amounts of data. As networks and transmission are becoming increasingly important for computational...
详细信息
ISBN:
(纸本)9781479900930
The log file for recording events in a cloud platform is maintained by a computer server and generally contains large amounts of data. As networks and transmission are becoming increasingly important for computational science, we are working on proposing a log file transmission algorithm. This new algorithm focuses on optimizing the performance of log file transmission, which is independent of transport protocols. Our approach includes two components: the file splitting and buffer match. The file splitting performs file compression and redundancy elimination, and the buffer memory match avoids transferring the redundant data. Experimental results verify that the log file transmission algorithm can effectively eliminate the redundancy in the log file and reduce the amount of data transmission by 90%.
This paper presents a novel trip route construction using location check-in data. Given a set of preference lists of locations from users, we aim to coordinate their preferred locations to visit and construct a route ...
详细信息
ISBN:
(纸本)9781450322157
This paper presents a novel trip route construction using location check-in data. Given a set of preference lists of locations from users, we aim to coordinate their preferred locations to visit and construct a route which not only satisfying user preferences as many as possible, but also being popular and reasonable. We formulate such preferred route construction as an optimization problem. We solve it efficiently and effectively by devising some greedy methods. Experiments on Gowalla large-scale check-in data show the promising effectiveness and efficiency of our methods.
暂无评论