您的位置: 专家智库 > >

国家自然科学基金(s60933005)

作品数:3 被引量:8H指数:2
发文基金:国家自然科学基金更多>>
相关领域:自动化与计算机技术电子电信更多>>

文献类型

  • 3篇中文期刊文章

领域

  • 3篇自动化与计算...
  • 1篇电子电信

主题

  • 1篇NOSQL
  • 1篇PAGERA...
  • 1篇SCHEME
  • 1篇VERIFI...
  • 1篇AUDITI...
  • 1篇CLUSTE...
  • 1篇EFFICI...
  • 1篇FRAGME...
  • 1篇FRAGME...
  • 1篇HYPER
  • 1篇IDENTI...
  • 1篇INFLUE...
  • 1篇MEASUR...
  • 1篇PUBLIC
  • 1篇USERS
  • 1篇ALLOCA...
  • 1篇SPREAD...
  • 1篇MICROB...

传媒

  • 2篇Journa...
  • 1篇Fronti...

年份

  • 1篇2015
  • 1篇2014
  • 1篇2013
3 条 记 录,以下是 1-3
排序方式:
NaEPASC:a novel and efficient public auditing scheme for cloud data被引量:2
2014年
Cloud computing is deemed the next-generation information technology(IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applications with high quality guaranteed. However, cloud users no longer possess their data in a local data storage infrastructure,which would result in auditing for the integrity of outsourced data being a challenging problem, especially for users with constrained computing resources. Therefore, how to help the users complete the verification of the integrity of the outsourced data has become a key issue. Public verification is a critical technique to solve this problem, from which the users can resort to a third-party auditor(TPA) to check the integrity of outsourced data. Moreover,an identity-based(ID-based) public key cryptosystem would be an efficient key management scheme for certificatebased public key setting. In this paper, we combine ID-based aggregate signature and public verification to construct the protocol of provable data integrity. With the proposed mechanism, the TPA not only verifies the integrity of outsourced data on behalf of cloud users, but also alleviates the burden of checking tasks with the help of users' identity. Compared to previous research, the proposed scheme greatly reduces the time of auditing a single task on the TPA side. Security analysis and performance evaluation results show the high efficiency and security of the proposed scheme.
Shuang TANYan JIA
Measuring the spreadability of users in microblogs被引量:3
2013年
Message forwarding (e.g.,retweeting on Twitter.com) is one of the most popular functions in many existing microblogs,and a large number of users participate in the propagation of information,for any given messages.While this large number can generate notable diversity and not all users have the same ability to diffuse the messages,this also makes it challenging to find the true users with higher spreadability,those generally rated as interesting and authoritative to diffuse the messages.In this paper,a novel method called SpreadRank is proposed to measure the spreadability of users in microblogs,considering both the time interval of retweets and the location of users in information cascades.Experiments were conducted on a real dataset from Twitter containing about 0.26 million users and 10 million tweets,and the results showed that our method is consistently better than the PageRank method with the network of retweets and the method of retweetNum which measures the spreadability according to the number of retweets.Moreover,we find that a user with more tweets or followers does not always have stronger spreadability in microblogs.
Zhao-yun DINGYan JIABin ZHOUYi HANLi HEJian-feng ZHANG
关键词:SPREADABILITYINFLUENCEPAGERANKMICROBLOGS
A new fragment re-allocation strategy for NoSQL database systems被引量:3
2015年
Abstract NoSQL databases are famed for the characteristics of high scalability, high availability, and high faulttolerance. So NoSQL databases are used in a lot of applications. The data partitioning strategy and fragment allocation strategy directly affect NoSQL database systems' performance. The data partition strategy of large, global databases is performed by horizontally, vertically partitioning or combination of both. In the general way the system scatters the related fragments as possible to improve operations' parallel degree. But the operations are usually not very complicated in some applications, and an operation may access to more than one fragment. At the same time, those fragments which have to be accessed by an operation may interact with each other. The general allocation strategies will increase system's communication cost during operations execution over sites. In order to improve those applications' performance and enable NoSQL database systems to work efficiently, these applications' fragments have to be allocated in a reasonable way that can reduce the communication cost i.e., to minimize the total volume of data transmitted during operations execution over sites. A strategy of clustering fragments based onhypergraph is proposed, which can cluster fragments which were accessed together in most operations to the same cluster. The method uses a weighted hypergraph to represent the fragments' access pattem of operations. A hypergraph partitioning algorithm is used to cluster fragments in our strategy. This method can reduce the amount of sites that an operation has to span. So it can reduce the communication cost over sites. Experimental results confirm that the proposed technique will effectively contribute in solving fragments re-allocation problem in a specific application environment of NoSQL database system.
Zhikun CHENShuqiang YANGShuang TANLi HEHong YINGe ZHANG
共1页<1>
聚类工具0