Repair Tree: Fast Repair for Single Failure in Erasure-coded Distr ibuted Storage Systems Abstract– In order to guarantee data reliability, erasure codes have been used in distributed storage systems. Nevertheless, this mechanism suffers from the repair problem that excess data are needed to repair a single failure, causing both high bandwidth consuming for the network…
Coverage Performance of Joint Transmission for Moving Relay Enabled Cellular Networks in Dense Urban Scenarios Abstract– In order to guarantee data reliability, erasure codes have been used in distributed storage systems. Nevertheless, this mechanism suffers from the repair problem that excess data are needed to repair a single failure, causing both high bandwidth consuming for…
Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm Abstract? A peer-to-peer system, a node should estimate reputation of other peers not only on the basis of its own interaction, but also on the basis of expression of other nodes. Reputation aggregation mechanism implements strategy for achieving this. Reputation aggregation in peer to peer networks…
Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems Abstract? Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems. Web service recommendation systems can help service users to locate the right service from the large number of available web services. Avoiding recommending dishonest or unsatisfactory services is a fundamental…
Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems Abstract?Web service recommendation systems can help service users to locate the right service from the large number of available web services. Avoiding recommending dishonest or unsatisfactory services is a fundamental research problem in the design of web service recommendation systems. Reputation of web…
Rescheduling of real power for congestion management with integration of pumped storage hydro unit using firefly algorithm Abstract?Abstract Post-deregulation era of power system operation produces more pressure on Independent System Operator (ISO) to ensure congestion free transmission network without destroying system security. Inorder to relieve transmission congestion, ISO initiates correct methods by maintaining system reliability…
Rescheduling of real power for congestion management with integration of pumped storage hydro unit using firefly algorithm Abstract?Abstract During disaster events, timely and targeted information provision and exchange could provide great help to the stricken population in difficult and complicated environments. This paper reports a serviceoriented system, called Rescue Wings, for providing emergency support to…
Research on Data Fusion Method for Archaeological Site Identification Abstract?China is the only country in the world with continuous ancient civilization whose history can be traced for more than 5000 years. With the rapid development of remote sensing, abundant remote sensing data of the same site by different remote sensors are available at the…
Research on MapReduce-based Cloud Storage Batch Auditing Abstract?Cloud Storage is a new kind of network storage technology. It is developed from Cloud Computing, which has been envisioned as the next-generation architecture of IT enterprise. Cloud Storage is very popular for its quick, cheap and convenient services. However, it also brings new and challenging security problems…
Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Network Abstract-In the first place, aiming at the serious impact of the typical network attacks caused by the limited energyand the poor deployment environment of wireless sensor network (WSN) on data transmission, a trust sensing-based secure routing mechanism (TSSRM) with the lightweight characteristics and…
Research Publication Management Abstract?Research Publication Management. In the Web services environment, service level agreement (SLA) refers to mutually agreed understandings and expectations of the evaluation criteria for service quality between service providers and customers. In this paper, we put forward a complete SLA management model including the lifecycle definition of SLA management for Web services,…
Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and…