With the rapid growth of e-Learning, a tremendous amount of learning content has been developed by numerous providers. Recently, the Sharable Content Object Reference Model (SCORM) has been widely accepted as a standa...
详细信息
Network coding can ease the block scheduling and thus makes the distribution more efficient. However, the complexities of encoding and decoding increase sharply as the content size scales up. In this paper, we propose...
详细信息
It is well known that network coding can enhance the performance of Peer-to-Peer (P2P) content distribution systems since it benefits block scheduling. In this paper, we introduce our P2P content distribution system &...
详细信息
Layering techniques effectively cope with network heterogeneity encountered in media distribution. Recent work on network coding shows that the multicast throughput can be greatly improved by allowing coding operation...
详细信息
The issue of data privacy is considered a significant hindrance to the development and industrial applications of database publishing and data mining techniques. Among many privacy-preserving methodologies, data pertu...
详细信息
ISBN:
(纸本)9781615671090
The issue of data privacy is considered a significant hindrance to the development and industrial applications of database publishing and data mining techniques. Among many privacy-preserving methodologies, data perturbation is a popular technique for achieving a balance between data utility and information privacy. It is known that the attacker's background information about the original data can play a significant role in breaching data privacy. In this paper, we analyze data perturbation's potential privacy vulnerability in the presence of known background information in privacy-preserving database publishing and data mining based on the eigenspace of the perturbed data under some constraints. We study the situation in which data privacy may be compromised with the leakage of a few original data records. We first show that additive perturbation preserves the angle between data records during the perturbation. Based on this angle-preservation property, we show that, in a general perturbation model, even the leakage of only one single original data probably degrades the privacy of perturbed data in some cases. We theoretically and experimentally show that a general data perturbation model is vulnerable from this type of background privacy breach.
Forward secure revocation for group signature allows a revoked group member to preserve the anonymity of its signatures generated before the revocation. Most of the existing schemes of this type either have the signin...
详细信息
Applications performance is a criterion for system evaluation, and hence performance tuning for these applications is of great interest. One such benchmark application is highperformance Linpack (HPL). Although guide...
详细信息
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of confidential knowledge when the social ne...
详细信息
ISBN:
(纸本)9781615671090
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of confidential knowledge when the social network data is shared or made public. In addition to the current social network anonymity de-identification techniques, we study a situation, such as in a business transaction network, in which weights are attached to network edges that are considered to be confidential (e.g., transactions). We consider perturbing the weights of some edges to preserve data privacy when the network is published, while retaining the shortest path and the approximate cost of the path between some pairs of nodes in the original network. We develop two privacy-preserving strategies for this application. The first strategy is based on a Gaussian randomization multiplication, the second one is a greedy perturbation algorithm based on graph theory. In particular, the second strategy not only yields an approximate length of the shortest path while maintaining the shortest path between selected pairs of nodes, but also maximizes privacy preservation of the original weights. We present experimental results to support our mathematical analysis.
Loop scheduling on parallel and distributed systems has been a critical problem. Furthermore, it becomes more difficult to deal with on the emerging heterogeneous grid environments. In the past, some loop self-schedul...
详细信息
Loop scheduling on parallel and distributed systems has been a critical problem. Furthermore, it becomes more difficult to deal with on the emerging heterogeneous grid environments. In the past, some loop self-scheduling schemes have been proposed to be applicable to heterogeneous gird environments. In this paper, we propose a performance-based approach, which partitions loop iterations according to the performance weight of nodes. To verify the proposed approach, a grid testbed that consists four schools is built, and matrix multiplication example is implemented to be executed in this testbed. Experimental results show that the proposed approach performs better than previous schemes.
暂无评论