Big Data Technologies and Applications
13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings
Book and Conference Proceedings
13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings
Chapter and Conference Paper
Pervasive rumors in social networks have significantly harmed society due to their seditious and misleading effects. Existing rumor detection studies only consider practical features from a propagation tree, b...
Chapter
Author Osama Zwaid Alsulami name is updated to Osama Zwaid Aletri throughout the book.
Chapter
The fifth generation mobile wireless communications steered services across a wide range of sectors such as transport, healthcare, retail, finance, factories, etc. Deployment of ultra-low latency and high band...
Chapter
This chapter provides details of the existing work related to our study. It introduces the schemes related to privacy protection and behavior accountability in Sect. 2.1. In this book, we not only provide the sol...
Chapter
Privacy protection and behavior accountability are two important factors of network security, and they are a pair of conflicting requirements. If we want to strengthen the supervision and accountability of use...
Chapter
This chapter introduces the research background of this book and provides definitions of privacy and accountability that apply to this book. It discusses the privacy protection and behavior accountability from...
Chapter
With the increasing emphasis on information security by users, many encrypted traffic is being transmitted over the network. However, even if the data is encrypted, it is not enough to protect the privacy of u...
Chapter
Information-Centric Networking (ICN) has become a promising candidate for future Internet architectures. Named Data Networking (NDN) is one of the most typical ICN architectures, where communication is driven ...
Chapter
This chapter introduces an architecture based on content that can be used to balance privacy protection and behavior accountability in the network. The terms requester and receiver are used interchangeably in thi...
Chapter
This chapter introduces a service-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. In practice, the architecture proposed in this chapter can be ...
Chapter
This chapter introduces a flow-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. A self-certifying identifier is proposed to efficiently identify ...
Chapter and Conference Paper
Heavy hitters can provide an important indicator for detecting abnormal network events. Most of existing algorithms for heavy hitter identification are implemented to deal with static datasets generated withi...
Article
Book and Conference Proceedings
14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II
Book and Conference Proceedings
14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I
Article
The hypercube and torus are two important message-passing network architectures of high-performance multicomputers. Analytical models of multicomputer networks under the non-bursty Poisson traffic have been wi...
Article
Interconnection networks are hardware fabrics supporting communications between individual processors in multicomputers. The low-dimensional k-ary n-cubes (or torus) with adaptive wormhole switching have attracte...
Chapter and Conference Paper
Analytical models for adaptive routing in multicomputer inter-connection networks with the traditional non-bursty Poisson traffic have been widely reported in the literature. However, traffic loads generated b...