With the rapid development of network,network identity management is becoming more and more *** identity in cyberspace associated in reality has been one significant and urgent task as online life becomes *** this pap...
详细信息
With the rapid development of network,network identity management is becoming more and more *** identity in cyberspace associated in reality has been one significant and urgent task as online life becomes *** this paper gives a new network identity management systems model based on the present model,including a two-party identity management model,a three-party identity management model,and a user-centric five-party identity management *** new model made by new five parties can realize the network identity management under huge amounts of data and for all kinds of network identities,such as personal,organization,software,service,etc.,and the new network identity management model helps to identity management in cyberspace.
The performance of optimum combining (OC) in decode-and forward (DF) relaying in the presence of a Poisson field of interferers is analyzed. An approximation for the outage probability of the OC receiver is derived by...
详细信息
ISBN:
(纸本)9781467364300
The performance of optimum combining (OC) in decode-and forward (DF) relaying in the presence of a Poisson field of interferers is analyzed. An approximation for the outage probability of the OC receiver is derived by considering the temporal correlation of the interference. Despite the randomness of the number and the locations of the interferers, the OC receiver suppresses the interference at the destination node and diversity gains are achieved, provided that the relay nodes are noise limited. For single-antenna relay nodes, the end-to-end performance is vulnerable to interference at the relay nodes which is not canceled, resulting in zero diversity gains.
Similarity measurement is a crucial process in collaborative filtering. User similarity is computed solely based on the numerical ratings of users. In this paper, we argue that the social information of users should b...
详细信息
In this paper, we investigate a typical clustering technology, namely, Gaussian mixture model (GMM)-based approach, for user interest prediction in social networks. The establishment of the model follows the following...
详细信息
In this paper, we investigate a typical clustering technology, namely, Gaussian mixture model (GMM)-based approach, for user interest prediction in social networks. The establishment of the model follows the following process: collect dataset from 4613 users and more than 16 million messages from Sina Weibo, obtain each user's interest eigenvalue sequence and establish GMM model to clustering users. In theory and experiment, this approach is feasible. The GMM-based approach considers the prediction accuracy and consuming time. A series of experiments are conducted to validate the feasibility and efficiency of the proposed solution and whether it can achieve a higher accuracy of prediction compared with other approaches, such as SVM and K-means. Further experiments show that GMM-based approach could produce higher prediction accuracy of 93.9%, thus leveraging computation complexity.
Communication privacy and latency perceived by users have become great concerns for delay-sensitive Internet services. Existing anonymous communication systems either provide high anonymity at an expense of prolonged ...
详细信息
Communication privacy and latency perceived by users have become great concerns for delay-sensitive Internet services. Existing anonymous communication systems either provide high anonymity at an expense of prolonged latency (e.g., mix-net), or offer better real-time performance by sacrificing the ability against traffic analysis attacks (e.g., Onion Routing). The emerging Software-Defined networking (SDN) introduces additional challenges to communication anonymity, due to the existence of a centralized controller that has a global view of the entire network traffic. In this paper, we propose a new anonymous communication scheme for delay-sensitive services under SDN scenarios, which can simultaneously protect communication privacy and reduce the end-to-end latency. A self-adaptive method based on the mix-net framework is designed to dynamically modify the waiting threshold of mix nodes, which helps to reduce the communication latency. In order to preserve the degree of anonymity, the self-adaptive method is incorporated with a random walking strategy for packets forwarding. Both theoretical analysis and experimental results prove that our scheme provides a moderate degree of anonymity and effectively reduces the latency derived from mix-net by up to 50%.
In this paper, we present a two-hop-relay WCDMA cellular system with queueing capability, where a call can wait in the incoming buffer at the congested Base Transceiver Station (BTS) if no channel is immediately avail...
详细信息
ISBN:
(纸本)9781849199940
In this paper, we present a two-hop-relay WCDMA cellular system with queueing capability, where a call can wait in the incoming buffer at the congested Base Transceiver Station (BTS) if no channel is immediately available, so as to reduce the call blocking rate. We develop an analytic model based on Multidimensional Markov chains. Then based on this model, we can obtain the average transmission rate and the queuing delay performance of the system respectively. Finally, through numerical calculation, we analyze the impact of the various parameters on the performance of the two-hop-relay WCDMA cellular system with queueing capability.
While the large-scale deformations such as the Laplacian deformation method could not synthesize new expressional details, this paper proposes a method for simulating different subtle facial expressions based on the K...
详细信息
In order to reduce the energy consumption and improve the response performance, by introducing the strategies of sleep-delay, pre-awake and split timing to IEEE 802.3az, an enhanced Ethernet energy saving mechanism is...
详细信息
The existing grid-based uncertain data stream clustering algorithms are fast but low-accuracy, and sensitive to user-specified threshold. In order to solve the above problems, a density grid-based uncertain data strea...
详细信息
Many of the previous incremental methods in data streams are deleting the old patterns and adding to the new patterns directly, which may delete useful patterns too early. Both different real data and the data occurri...
详细信息
暂无评论