The behavior of peoples' request for a post on online social media is a stochastic process that makes post's ranking highly skewed in nature. We mean peoples interest for a post can grow/decay exponentially or linearly. Considering this nature of the evolutionary peoples' interest, this paper presents a Growth-based Popularity Predictor (GPP) model for predicting and ranking the web-contents. Three different kinds of web-based real datasets namely Movielens, Facebook-wall-post and Digg are used to evaluate the performance of the proposed model. This performance is measured based on four information-retrieval metrics Area Under receiving operating Characteristic (AUC), Novelty, Precision, and Kendal's Tau. The obtained results show that the prediction performance can be further improved if the score is mapped onto a cumulative predicted item's ranking.INDEX TERMS Retrieval-ranking, trend prediction, recommender system, social media, information retrieval.
This paper discusses covert channel attacks in VMM, with emphasis on some of its important detection techniques. This is an active research area whereby many security frameworks have been proposed for isolating VMs, but still covert channels in commercial clouds exist. Discussion in detail (with examples and expressions) has been done as to how information flow leads to covert channel and the methods used for covert channel detection. In this paper various scenarios are discussed where efforts have been made to detect all possible covert channels and counter the attacks. Among the basic four research areas in the study of covert channels (Define, Detect, Measure and Mitigate), Detection is the most challenging. This paper focuses on various detection techniques and tools available, and analyzes if those are sufficient to list all possible covert channels. A case study of Xen is discussed with respect to a storage covert channel.
This chapter presents query-broadcasting techniques used to minimize expenses of the route discovery in ad hoc networks. A broad variety of such techniques have been proposed that improved the effectiveness and efficiency in various aspects of route discovery considering time and energy. Time-to-live based broadcast is the most common controlled flooding scheme widely used in routing protocols. One category of such techniques leveraged the routing history, while other category used broadcast repealing strategy to cancel the query-broadcast after successful route discovery.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.