A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Distributed Client-Server Assignment for Online Social Network Applications
2014
IEEE Transactions on Emerging Topics in Computing
INDEX TERMS Distributed algorithms, online social network, operations research, combinatorial optimization. I. ...
Specifically, for an online social network system (OSN) such as Facebook, each user profile and its data are stored at its primary servers. ...
The evaluations were done with two types of data sets: synthetic networks and real-world online social networks. ...
doi:10.1109/tetc.2014.2358801
fatcat:wdlwdlv7k5cytf7w3c6n4j75xe
Dynamic Assignment Of Users And Management Of User'S Data In Social Network
2018
Zenodo
The proposed system has capability to keep inter-server communication below required level in distributed environment (Online social network). ...
The system - Dynamic Ass ignment of users to servers in social networking us e community analysis algorithm (CAA) to resolve the e xtra load that the servers. ...
LITERATURE SURVEY The solution for dynamic assignment of users to distributed servers in Online Social networking applications is need to be joined with user data management. ...
doi:10.5281/zenodo.1473254
fatcat:oe6yeknahjfytjxz4bafgd5iny
Peer to Peer (P2P) Social Networks: An Improvement on Availability in a Trusted Way
2014
IOSR Journal of Computer Engineering
Peer to Peer (P2P) infrastructure has become really important for designing distributed social networks. ...
Online Social Networks (OSNs) provide the easiest way to stay connected to the people dear and important to us. ...
The Replication Table is used to store the caching information for every available/online client. A timestamp is also assigned with contents. ...
doi:10.9790/0661-1629104114
fatcat:ncvuqki5sfegbmfejhneowtdji
Crypto-Book: Bootstrapping Privacy Preserving Online Identities from Social Networks
[article]
2014
arXiv
pre-print
Crypto-Book relies on a set of independently managed servers that collectively assign each social network identity a public/private keypair. ...
Social networking sites supporting federated identities offer a convenient and increasingly popular mechanism for cross-site authentication. ...
Key Assignment In this section we explain how public/private key pairs are assigned and distributed to social networking accounts. ...
arXiv:1406.4053v1
fatcat:vqgq5cz6p5gsjawhep4fuumrqq
Crypto-Book builds a privacy-preserving cryptographic layer atop existing social network identities, via third-party key servers that convert social network identities into public/private keypairs on demand ...
We present Black Box, a case study application that uses Crypto-Book for accountable anonymous whistle-blowing. ...
The client user logs into an online social networking site such as Facebook, and is provided with an OAuth token by the Facebook (or other social networking site) API. ...
doi:10.1145/2535771.2535798
dblp:conf/hotnets/MaheswaranWF13
fatcat:prbtc4gfmfchffrnxq5335xyxy
A CSA Method for Assigning Client to Servers in Online Social Networks
2015
Journal of electrical and computer engineering innovations
This paper deals with the problem of user-server assignment in online social network systems. ...
Online social network applications such as Facebook, Twitter, or Instagram are built on an infrastructure of servers that enables them to communicate with each other. ...
INTRODUCTION Online social network applications rely on an infrastructure of servers that facilitate communication among their users [1] . ...
doi:10.22061/jecei.2016.451
doaj:5d8b60eadba544a79ab707c5deca71dc
fatcat:jh7p5nb7drf25i5pwfwy7xxicu
Development Of Security Detection Model For The Security Of Social Blogs And Chatting From Hostile Users
2017
Zenodo
There has been a significant rise in the number of platforms, both social and professional, such as WhatsApp, Facebook, and Twitter, which allow people to share their experiences, views and knowledge with ...
Worldwide, a large number of people interact with each other by means of online chatting. ...
Nowadays, online forums and social networking sites are becoming a platform for business and socially active people to engage with each other for business networking, discussing issues and promoting businesses ...
doi:10.5281/zenodo.1211165
fatcat:4wcg7xtgmndkfgjbprakjofrum
Development of Security Detection Model for the Security of Social Blogs and Chatting from Hostile Users
2017
International Journal of Computer Science & Information Technology (IJCSIT)
There has been a significant rise in the number of platforms, both social and professional, such as WhatsApp, Facebook, and Twitter, which allow people to share their experiences, views and knowledge with ...
Worldwide, a large number of people interact with each other by means of online chatting. ...
Nowadays, online forums and social networking sites are becoming a platform for business and socially active people to engage with each other for business networking, discussing issues and promoting businesses ...
doi:10.5121/ijcsit.2017.9504
fatcat:onauzci35vf5fp4phdene3ubbe
Horton: Online Query Execution Engine for Large Distributed Graphs
2012
2012 IEEE 28th International Conference on Data Engineering
Large graphs are used in many applications, such as social networking. The management of these graphs poses new challenges because such graphs are too large to fit on a single server. ...
In the demo, we show the functionality of Horton managing a large graph for a social networking application called Codebook, in which a graph models data on software components, developers, development ...
ACKNOWLEDGEMENT We thank Alan Geller and Jim Larus for their feedback. ...
doi:10.1109/icde.2012.129
dblp:conf/icde/SarwatEHK12
fatcat:jr37w3eftbcmxo7oqn4edkkove
Results from a Practical Deployment of the MyZone Decentralized P2P Social Network
[article]
2013
arXiv
pre-print
This paper presents MyZone, a private online social network for relatively small, closely-knit communities. MyZone has three important distinguishing features. ...
Finally, MyZone minimizes deployment cost by minimizing its computation, storage and network bandwidth requirements. ...
Figure 2 : 2 Deployment diagram for a private social network.
Figure 3 : 3 A snapshot of MyZone's client application. management challenges. ...
arXiv:1305.0606v1
fatcat:u3ah4p5njjgn5ez2tm4itipppq
PAIDD: a hybrid P2P-based architecture for improving data distribution in social networks
2014
Science China Information Sciences
Rapid growth in social networks (SNs) presents a unique scalability challenge for SN operators because of the massive amounts of data distribution among large number of concurrent online users. ...
PAIDD fulfills effective data distribution primarily through P2P connectivity and social graph among users but with the help of central servers. ...
The presence server returns the following information for each online peer. IP, Port, Network Type, Content ID, Public Key . ...
doi:10.1007/s11432-014-5084-x
fatcat:34hzeyxjgjarzesqrizrr4zsaa
Privacy-preserving photo sharing based on a secure JPEG
2015
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
Sharing photos online is a common activity on social networks and photo hosting platforms, such as Facebook, Pinterest, Instagram, or Flickr. ...
We demonstrate the proposed architecture with a prototype mobile iOS application called ProShare that offers scrambling as the privacy protection tool for a selected region in a photo, secure access to ...
ACKNOWLEDGMENT This work has been conducted in the framework of the Swiss SERI C12.0081, Eurostars ToFuTV, and EC funded Network of Excellence VideoSense. ...
doi:10.1109/infcomw.2015.7179382
dblp:conf/infocom/YuanKE15
fatcat:ithkv3y2inas5p52y4d4jrdbfu
Confidant: Protecting OSN Data without Locking It Up
[chapter]
2011
Lecture Notes in Computer Science
Online social networks (OSNs) are immensely popular, but participants are increasingly uneasy with centralized services' handling of user data. ...
Confidant replicates a user's data on servers controlled by her friends. Because data is stored on trusted servers, Confidant allows application code to run directly on these storage servers. ...
Introduction Online social networks (OSNs) such as Facebook, MySpace, and Twitter have enhanced the lives of millions of users worldwide. ...
doi:10.1007/978-3-642-25821-3_4
fatcat:3vzwk6j6ubga3ezppxr55e27xq
Model-Based Groupware Solution for Distributed Real-Time Collaborative 4D Planning through Teamwork
2012
Journal of computing in civil engineering
Tekla Structures applies the master/working model to realize model control in its server/client applications (Tekla 2010). ...
Despite their advancements in cutting-edge applications using 3D models (both CAD and BIM), none of the above examples have discussed model-based groupware for distributed collaboration, which still remains ...
This flexibility enables 4DX client to be applicable for both offline and online conditions.
System Validation The system validation was performed in a truly geographically distributed condition. ...
doi:10.1061/(asce)cp.1943-5487.0000153
fatcat:2pp5324uhbdgplbagugwzbdgyy
Secure JPEG scrambling enabling privacy in photo sharing
2015
2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)
With the popularization of online social networks (OSNs) and smart mobile devices, photo sharing is becoming a part of people' daily life. ...
An unprecedented number of photos are being uploaded and shared everyday through online social networks or photo hosting services, such as Facebook, Twitter, Instagram, and Flickr. ...
Recipient-side Operation There are two ways for a recipient to view a photo: (i) via a client application on the device, and (ii) via a URL posted on social networks. ...
doi:10.1109/fg.2015.7285022
dblp:conf/fg/YuanKE15
fatcat:fmop57jegzemxdsqwq7lxjbdum
« Previous
Showing results 1 — 15 out of 19,693 results