首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 130 毫秒
1.
The rapid development of social networking sites brings about many data mining tasks and novel challenges. We focus on classification tasks with students’ interaction information in a social network. To mitigate the difficulties of developing a learning system, this study proposes a new computing paradigm: spectral clustering as a service, providing a service to enable exacting social dimensionality on demand. Spectral clustering has been developed in a social network dimensionality refinement model as a kernel middleware, namely SNDR. The SNDR service can process the sparse information, explore the network’s topology and finally exact suitable features. Experimental results justify the design of Collective Behavior Learning System and the implementation of the Social Network Dimensionality Refinement model’s service. Our system makes better performance than baseline methods.  相似文献   

2.
Trusted collaborative systems require peers to be able to communicate over private, authenticated end-to-end channels. Network-layer approaches such as Virtual Private Networks (VPNs) exist, but require considerable setup and management which hinder the establishment of ad-hoc collaborative environments: trust needs to be established, cryptographic keys need to be exchanged, and private network tunnels need to be created and maintained among end users. In this paper, we propose a novel system architecture which leverages existing social infrastructures to enable ad-hoc VPNs which are self-configuring, self-managing, yet maintain security amongst trusted and untrusted third parties. The key principles of our approach are: (1) self-configuring virtual network overlays enable seamless bi-directional IP-layer connectivity to socially connected parties; (2) online social networking relationships facilitate the establishment of trust relationships among peers; and (3) both centralized and decentralized databases of social network relationships can be securely integrated into existing public-key cryptography (PKI) implementations to authenticate and encrypt end-to-end traffic flows. The main contribution of this paper is a new peer-to-peer overlay architecture that securely and autonomously creates VPN tunnels connecting social peers, where online identities and social networking relationships may be obtained from centralized infrastructures, or managed in a decentralized fashion by the peers themselves.This paper also reports on the design and performance of a prototype implementation that embodies the SocialVPN architecture. The SocialVPN router builds upon IP-over-P2P (IPOP) virtual networks and a PKI-based tunneling infrastructure, which integrates with both centralized and decentralized social networking systems including Facebook, the Drupal open-source content management system, and emailing systems with PGP support. We demonstrate our prototype’s ability to support existing, unmodified TCP/IP applications while transparently dealing with user connectivity behind Network Address Translators (NATs). We also present qualitative and quantitative analyses of functionality and performance based on wide-area network experiments using PlanetLab and Amazon EC2.  相似文献   

3.
4.
Recent developments in information technology and Web services have increased the potential for creating more rapid and extensive social networks and business relationships. Web 2.0 technologies, commonly referred to as online social media, have become important tools within the growth of information and communication technology (ICT) in the last few years. Web 2.0 tools such as blogs, Wiki and other services, which are widely used by individuals, also have an effect on customer relationship management (CRM) systems. Consequently, social CRM (SCRM) is emerging as a new paradigm for integrating social networking in more traditional CRM systems. However, social CRM is yet to be fully utilised as a value-adding tool in improving customer relationships. This paper reports on a scoping study that explored the current situation of CRM adoption in banking industry in Saudi Arabia. The aim of this paper is to identify the factors that may influence businesses and customers’ adoption of social CRM. Various models have been proposed to study ICT and information systems acceptance and usage. This paper proposes an enhancement to one of these models, specifically the Technology Acceptance Model (TAM), by incorporating a range of factors identified in the social networking and business relationships literature believed to influence social CRM adoption. In particular, the model proposes that familiarity, caring behaviour, sharing information and perceived trustworthiness can generate cognitive view about the relationships between employees and customers. This view besides Web 2.0 features may offer a way of analysing the potential adoption of social CRM.  相似文献   

5.
This paper offers an introduction to poststructuralist interpretivist research in information systems, through a poststructuralist theoretical reading of the phenomenon and experience of social networking websites, such as Facebook. This is undertaken through an exploration of how loyally a social networking profile can represent the essence of an individual, and whether Platonic notions of essence, and loyalty of copy, are disturbed by the nature of a social networking profile, in ways described by poststructuralist thinker Deleuze's notions of the reversal of Platonism. In bringing a poststructuralist critique to such hugely successful and popular social information systems, the paper attempts to further open up the black box of the computer ‘user’, extend interpretive approaches to information systems research to embrace poststructuralism, and explore how notions of the Self might be reflected through engagement with information system (IS), and how an IS appreciation of the phenomenon of global social networking may benefit from embracing such a poststructuralist approach.  相似文献   

6.
As it has evolved, the Internet has had to support a broadening range of networking technologies, business models and user interaction modes. Researchers and industry practitioners have realised that this trend necessitates a fundamental rethinking of approaches to network and service management. This has spurred significant research efforts towards developing autonomic network management solutions incorporating distributed self-management processes inspired by biological systems. Whilst significant advances have been made, most solutions focus on management of single network domains and the optimisation of specific management or control processes therein. In this paper we argue that a networking infrastructure providing a myriad of loosely coupled services must inherently support federation of network domains and facilitate coordination of the operation of various management processes for mutual benefit. To this end, we outline a framework for federated management that facilitates the coordination of the behaviour of bio-inspired management processes. Using a case study relating to distribution of IPTV content, we describe how Federal Relationship Managers realising our layered model of management federations can communicate to manage service provision across multiple application/storage/network providers. We outline an illustrative example in which storage providers are dynamically added to a federation to accommodate demand spikes, with appropriate content being migrated to those providers servers under control of a bio-inspired replication process.  相似文献   

7.
Policy-based management (PBM) has been considered as a promising approach for design and enforcement of access management policies for distributed systems. The increasing shift toward federated information sharing in the organizational landscape, however, calls for revisiting current PBM approaches to satisfy the unique security requirements of the federated paradigm. This presents a twofold challenge for the design of a PBM approach, where, on the one hand, the policy must incorporate the access management needs of the individual systems, while, on the other hand, the policies across multiple systems must be designed in such a manner that they can be uniformly developed, deployed, and integrated within the federated system. In this paper, we analyze the impact of security management challenges on policy design and formulate a policy engineering methodology based on principles of software engineering to develop a PBM solution for federated systems. We present X-FEDERATE, a policy engineering framework for federated access management using an extension of the well-known role-based access control (RBAC) model. Our framework consists of an XML-based policy specification language, its UML-based meta-model, and an enforcement architecture. We provide a comparison of our framework with related approaches and highlight its significance for federated access management. The paper also presents a federation protocol and discusses a prototype of our framework that implements the protocol in a federated digital library environment.  相似文献   

8.
The explosion of social networking sites has not only changed the way people communicate, but also added a new dimension to the way for searching or investigating people. As users share a wide variety of information on social networking sites, concerns are growing about organisations’ access to personally identifiable data and users are increasingly worried about privacy on social network sites. The main threat with data gathering is not only from where gathering it, but also where it goes afterwards. Neither social network sites providers nor the governments have any way to effectively protect users against privacy violations. However, a variety of efforts need to be explored to change the situation. Social network sites should continue work to strengthen privacy settings. Laws and policies should be improved to regulate the social networking searching in its legality, necessity and proportionality.  相似文献   

9.
Networking plays a crucial role in cloud computing especially in an inter-cloud environment, where data communications among data centers located at different geographical sites form the foundation of inter-cloud federation. Data transmissions required for inter-cloud federation in the complex inter-cloud networking system are often point-to-multi points, which calls for a more effective and efficient multicast routing algorithm in complex networking systems. In this paper, we investigate the multicast routing problem in the inter-cloud context with K constraints where K ≥ 2. Unlike most of existing algorithms that are too complex to be applied in practical scenarios, a novel and fast algorithm for establishing multicast routing tree for inter-clouds is proposed. The proposed algorithm leverages an entropy-based process to aggregate all weights into a comprehensive metric, and then uses it to search a multicast tree (MT) on the basis of the shortest path tree (SPT). We conduct complexity analysis and extensive simulations for the proposed algorithm from the approximation perspective. Both analytical and experimental results demonstrate that the algorithm is more efficient than a representative multi-constrained multicast routing algorithm in terms of both speed and accuracy, and thus we believe that the proposed algorithm is applicable to the inter-cloud environment.   相似文献   

10.
张柯  黄柯棣 《计算机仿真》2005,22(6):234-237
FEPW是描述联邦运行配置及动态特性的规范,其内容涉及到联邦、成员、软硬件设施、网络、RTI、对象模型等各方面。联邦运行全过程管理技术包括联邦运行前、运行中和运行后的管理技术,以及对联邦运行涉及的软硬件的综合管理技术。文章介绍了这两种技术,并分析了FEPW在联邦运行全过程管理中的应用途径及范围,得到了FEPW应该服务于全过程管理而全过程管理应该基于FEPW的结论。  相似文献   

11.
With the fast evolution of e-commerce, it is getting harder for traditional credit management systems to service online businesses with diversified needs in dynamic scenarios. This paper studies the nature of cyber credit from the perspective of social capital. We propose the credit assessment model using social capital variables extracted from the reputation system of an e-commerce platform and the associated online social network. In addition, we consider the dynamic and diversified effects of online reputation on sellers’ cyber credit, and we verify the rationality of the credit assessment model through analyzing the relationship between cyber credit and social network variables. We take Alibaba C2C e-commerce market as our experimental study platform and use the social networking information from Sina’s microblogging services. We find that social capital variables can be used to effectively measure the cyber credit of online sellers in C2C businesses.  相似文献   

12.
Recently, social networks have become the most prevalent IT paradigm, as the vast majority of Internet users maintain one or multiple social networking accounts. These accounts, irrespectively of the underlying service, contain rich information and data for the owner’s preferences, social skills, everyday activities, beliefs and interests. Along with these services, the computation, sensing and networking capabilities of the state of the art mobile and portable devices, with their always-on mode, assist users in their everyday lives. Thus, the integration of social networking services with current pervasive computing systems could provide the users with the potential to interact with other users that have similar interests, preferences and expectations; and in general, the same or similar context, for limited or not time periods, in order to ameliorate their overall experience, communicate, socialise and improve their everyday activities with minimal effort. This paper introduces a cross-community context management framework that is suitable for Cooperating Smart Spaces, which couple the advantages of pervasive computing and social networking. This framework goes beyond the state of the art, among others, in that cross-community context from a multitude of sources is collected and processed to enhance the end user experience and increase the perceived value of the services provided.  相似文献   

13.
Viral marketing has attracted considerable concerns in recent years due to its novel idea of leveraging the social network to propagate the awareness of products. Specifically, viral marketing first targets a limited number of users (seeds) in the social network by providing incentives, and these targeted users would then initiate the process of awareness spread by propagating the information to their friends via their social relationships. Extensive studies have been conducted for maximizing the awareness spread given the number of seeds (the Influence Maximization problem). However, all of them fail to consider the common scenario of viral marketing where companies hope to use as few seeds as possible yet influencing at least a certain number of users. In this paper, we propose a new problem, called J-MIN-Seed, whose objective is to minimize the number of seeds while at least J users are influenced. J-MIN-Seed, unfortunately, is NP-hard. Therefore, we develop an approximate algorithm which can provide error guarantees for J-MIN-Seed. We also observe that all existing studies on viral marketing assume that all users in the social network are of interest for the product being promoted (i.e., all users are potential consumers of the product), which, however, is not always true. Motivated by this phenomenon, we propose a new paradigm of viral marketing where the company can specify which types of users in the social network are of interest when promoting a specific product. Under this new paradigm, we re-define our J-MIN-Seed problem as well as the Influence Maximization problem and design some algorithms with provable error guarantees for the new problems. We conducted extensive experiments on real social networks which verified the effectiveness of our algorithms.  相似文献   

14.
《Computer Communications》2001,24(7-8):641-653
ATM network management has not yet reached the level of versatility and comprehensiveness exhibited by other aspects of this networking technology. Since the currently dominant general standards for broadband network management, primarily targeted towards large carrier networks, are too complex and intricate for smaller environments, e.g. LANs or corporate networks, ATM equipment manufacturers, in their effort to provide systems that exploit the power of ATM and yet remain practical and simple, usually resort to devising ad hoc proprietary extensions of simpler management frameworks, originally developed for other networking technologies. Such incompatible extensions, however, remain useless in the common case where the network is heterogeneous. The notion of abstract information modeling may be employed for improving on this situation.Building on this concept, the paper proposes a framework for developing ATM management systems intended for heterogeneous small- to medium-size networks. The general guidelines are illustrated through discussing a specific compliant management application intended for the remote monitoring of ATM network platforms and developed in the framework of a European research project. The application features a WWW interface and, as such, provides an example of the compatibility of information abstraction with the Web-based management techniques and of the benefits arising from the combination of the two notions.Lastly, and as the concept of abstracting information is inherent to recent frameworks for designing and programming distributed object systems, the paper explores this relation by discussing an alternative design of the monitoring application as a distributed object system.  相似文献   

15.
为了检验智慧工厂信息采集节点的上线率、组网耗时、轮询耗时、中继深度和组网稳定性等组网能力指标,为工业信息采集节点的研发、测试提供参考依据,设计了一种组网能力测试平台。该平台采用电磁兼容性良好的铝制组网单元作为信息采集节点从节点的测试载体,可为从节点提供工作电压和信号耦合通信渠道。采用“高频+低频+高频”组合电源滤波器,能够有效滤除120KHz~40MHz干扰信号,可为测试平台提供相对纯净的测试环境,保障测试平台的稳定性和测试数据可靠性。试验结果证明:建设的测试平台性能稳定、功能齐全,可为电力线通信产品的组网能力测试提供有力的数据参考。  相似文献   

16.
A safe and reliable in vivo nanoscale communication network will be of great benefit for medical diagnosis and monitoring as well as medical implant communication. This review article provides a brief introduction to nanoscale and molecular networking in general and provides opinions on the role of active networking for in vivo nanoscale information transport. While there are many in vivo communication mechanisms that can be leveraged, for example, forms of cell signaling, gap junctions, calcium and ion signaling, and circulatory borne communication, this review examines two in particular: molecular motor transport and neuronal information communication. Molecular motors transport molecules representing information and neural coding operates by means of the action potential; these mechanisms are reviewed within the theoretical framework of an active network. This review suggests that an active networking paradigm is necessary at the nanoscale along with a new communication constraint, namely, minimizing the communication impact upon the living environment. The goal is to assemble efficient nanoscale and molecular communication channels while minimizing disruption to the host organism.  相似文献   

17.
毛曦  李琦  刘帅  朱亚杰 《计算机科学》2012,39(105):229-231,264
随着网络技术的不断发展,互联网已经成为一个海量、复杂多样的数据源,特别是随着Web2. 0与社交网络的兴起,每个网民都可视为一个空间传感器,其源源不断地将周围的空间信息发布在网上,互联网中的空间信息日益丰富。提出了面向网络的空间信息提取系统,在从Web页面中所包含的半结构文本或自由文本中识别出完整位置的基础上,提取出与该位置相关的专题属性信息,并将其结构化和空间化。通过系统实例的研究,验证了本系统的可行性。  相似文献   

18.
A safe and reliable in vivo nanoscale communication network will be of great benefit for medical diagnosis and monitoring as well as medical implant communication. This review article provides a brief introduction to nanoscale and molecular networking in general and provides opinions on the role of active networking for in vivo nanoscale information transport. While there are many in vivo communication mechanisms that can be leveraged, for example, forms of cell signaling, gap junctions, calcium and ion signaling, and circulatory borne communication, this review examines two in particular: molecular motor transport and neuronal information communication. Molecular motors transport molecules representing information and neural coding operates by means of the action potential; these mechanisms are reviewed within the theoretical framework of an active network. This review suggests that an active networking paradigm is necessary at the nanoscale along with a new communication constraint, namely, minimizing the communication impact upon the living environment. The goal is to assemble efficient nanoscale and molecular communication channels while minimizing disruption to the host organism.  相似文献   

19.
Distributed shared memory (DSM) systems provide a simple programming paradigm for networks of workstations, which are gaining popularity due to their cost-effective high computing power. However, DSM systems usually exhibit poor performance due to the large communication delay between the nodes; and a lot of different memory consistency models have been proposed to mask the network delay. In this paper, we propose an asynchronous protocol for the release consistent memory model, which we call an Asynchronous Release Consistency (ARC) protocol. Unlike other protocols where the communication adheres to the synchronous request/receive paradigm, the ARC protocol is asynchronous, such that the necessary pages are broadcast before they are requested. Hence, the network delay can be reduced by proper prefetching of necessary pages. We have also compared the performance of the ARC protocol with the lazy release protocol by running standard benchmark programs; and the experimental results showed that the ARC protocol achieves a performance improvement of up to 29%.  相似文献   

20.
社交网络服务(social networking service,SNS)已融入到大众生活中。人们将自己的信息上传到网络中,并通过社交网站管理自己的社交圈子,由此造成大量的个人信息在社交网络上被公开。文章基于Twitter平台,设计实现了Twitter用户关系网的社区发现。通过实时采集Twitter用户信息,重建人物关系网,改进Newman快速算法划分社区发现人物关系网。文章通过可视化的界面呈现用户的社区关系,提供用户网络行为,为决策者的舆情监控或个性推荐提供了参考凭据。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号