Being a leading online service providing both local search and social networking functions, Foursquare has attracted tens of millions of users all over the world. As a location-centric platform, Foursquare maintains t...
详细信息
Being a leading online service providing both local search and social networking functions, Foursquare has attracted tens of millions of users all over the world. As a location-centric platform, Foursquare maintains the information of numerous venues, and it has recorded a tremendous amount of users' tips for these venues. Tips (micro-reviews) play a critical role in helping users find a good venue and providing comments for the venue owners. A lot of studies have been done in investigating social connections and check-in patterns among Foursquare users. However, there is a lack of a thorough study on tips, the primary type of user-generated contents (UGCs) in Foursquare. In this paper, by crawling and analyzing all tips published by more than 6 million users, we study Foursquare's tips from various aspects. We start from counting the number of tips published by different users and conduct a group-based analysis of the average number of published tips per user. Moreover, we look into the important fields of tips. We study the venue category distribution, and the evolution of the number and diversity of tips. Finally, we conduct a series of sentiment analysis by referring to the texts of all tips and introduce the concept of happiness index to evaluate the overall level of satisfaction of a set of tips. To the best of our knowledge, our study presents the first comprehensive and unbiased picture of tips in Foursquare.
In data storage systems, data are typically stored in redundant storage nodes to ensure storage reliability. When storage nodes fail, with the help of the redundant nodes, the lost data can be restored in new storage ...
详细信息
In data storage systems, data are typically stored in redundant storage nodes to ensure storage reliability. When storage nodes fail, with the help of the redundant nodes, the lost data can be restored in new storage nodes. Such a regeneration process may be aborted, since storage nodes may fail during the process. Therefore, reducing the time of regeneration process is a well-known challenge to improve the reliability of storage systems. Delayed repair is a typical repair scheme in real-world storage systems. It reduces the overhead of the regeneration process by recovering multiple node failures simultaneously. How to reduce the regeneration time of delayed repair is yet to be well addressed. Since available bandwidth is flowing in storage systems and the regeneration time is seriously affected by the available bandwidth, we find the key to solve this problem is determining the start time of the regeneration process. Via modeling this problem with Lyaponuv optimization framework, we propose an OMFR scheme to reduce the regeneration time. The experimental results show that OMFR scheme can reduce cumulative regeneration time by up to 78% compared with traditional delayed repair schemes.
OpenFlow has been widely used in Software Defined Networking (SDN) to customize data plane behaviors through policies given by a logically centralized controller. The centralized control plane design brings the potent...
详细信息
Internet of Things (IoT) has given rise to the fourth industrial revolution (Industrie 4.0), and it brings great benefits by connecting people, processes and data. However, cybersecurity has become a critical challeng...
Internet of Things (IoT) has given rise to the fourth industrial revolution (Industrie 4.0), and it brings great benefits by connecting people, processes and data. However, cybersecurity has become a critical challenge in the IoT enabled cyber physical systems, from connected supply chain, Big Data produced by huge amount of IoT devices, to industry control systems. Evolutionary computation combining with other computational intelligence will play an important role for cybersecurity, such as artificial immune mechanism for IoT security architecture, data mining/fusion in IoT enabled cyber physical systems, and data driven cybersecurity. This paper provides an overview of security challenges in IoT enabled cyber-physical systems and what evolutionary computation and other computational intelligence technology could contribute for the challenges. The overview could provide clues and guidance for research in IoT security with computational intelligence.
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation pr...
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation process of the network attack and defense training platform. This paper focuses on the cloud desktop construction scheme based on B/S structure, and aims to enhance the flexibility and convenience of network attack and defense training platform.
Managing virtualised computing, network and storage resources at large-scale in both public and private cloud datacentres is a challenging task. As an open source cloud operating system, OpenStack needs to be enhanced...
详细信息
Glaucoma disease detection from retinal images using classifiers like Least Square-Support Vector Machine classifier, Random forest, Dual Sequential Minimal Optimization classifier, Naive bayes classifier and Artifici...
详细信息
Glaucoma disease detection from retinal images using classifiers like least square-Support Vector Machine classifier, random forest, dual Sequential Minimal Optimization classifier, naive bayes classifier and artifici...
详细信息
Secret sharing is a scheme to distribute a secret message s into n participants, thus t or more participants can reconstruct the secret message s. While less than t shares can know nothing about the secret, the proble...
详细信息
Secret sharing techniques have been used to ensure data confidentiality and enable secure reconstruction of data. In this paper, we propose a novel secret sharing scheme called ESEC based on Elliptic Curve Cryptograph...
详细信息
暂无评论