19,693 Hits in 8.0 sec

Distributed Client-Server Assignment for Online Social Network Applications

Thuan Duong-Ba, Thinh Nguyen, Bella Bose, Duc A. Tran
2014 IEEE Transactions on Emerging Topics in Computing  
INDEX TERMS Distributed algorithms, online social network, operations research, combinatorial optimization. I.  ...  Specifically, for an online social network system (OSN) such as Facebook, each user profile and its data are stored at its primary servers.  ...  The evaluations were done with two types of data sets: synthetic networks and real-world online social networks.  ... 
doi:10.1109/tetc.2014.2358801 fatcat:wdlwdlv7k5cytf7w3c6n4j75xe

Dynamic Assignment Of Users And Management Of User'S Data In Social Network

Dipeeka V Aher, Prabhudev Irabashetti
2018 Zenodo  
The proposed system has capability to keep inter-server communication below required level in distributed environment (Online social network).  ...  The system - Dynamic Ass ignment of users to servers in social networking us e community analysis algorithm (CAA) to resolve the e xtra load that the servers.  ...  LITERATURE SURVEY The solution for dynamic assignment of users to distributed servers in Online Social networking applications is need to be joined with user data management.  ... 
doi:10.5281/zenodo.1473254 fatcat:oe6yeknahjfytjxz4bafgd5iny

Peer to Peer (P2P) Social Networks: An Improvement on Availability in a Trusted Way

Muhammed Tawfiqul Islam, Sabbir Ahmed, Kazi Chandrima Rahman, Dr. Syed Faisal hasan
2014 IOSR Journal of Computer Engineering  
Peer to Peer (P2P) infrastructure has become really important for designing distributed social networks.  ...  Online Social Networks (OSNs) provide the easiest way to stay connected to the people dear and important to us.  ...  The Replication Table is used to store the caching information for every available/online client. A timestamp is also assigned with contents.  ... 
doi:10.9790/0661-1629104114 fatcat:ncvuqki5sfegbmfejhneowtdji

Crypto-Book: Bootstrapping Privacy Preserving Online Identities from Social Networks [article]

John Maheswaran, Daniel Jackowitz, David Isaac Wolinsky, Lining Wang,, Bryan Ford
2014 arXiv   pre-print
Crypto-Book relies on a set of independently managed servers that collectively assign each social network identity a public/private keypair.  ...  Social networking sites supporting federated identities offer a convenient and increasingly popular mechanism for cross-site authentication.  ...  Key Assignment In this section we explain how public/private key pairs are assigned and distributed to social networking accounts.  ... 
arXiv:1406.4053v1 fatcat:vqgq5cz6p5gsjawhep4fuumrqq


John Maheswaran, David Isaac Wolinsky, Bryan Ford
2013 Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks - HotNets-XII  
Crypto-Book builds a privacy-preserving cryptographic layer atop existing social network identities, via third-party key servers that convert social network identities into public/private keypairs on demand  ...  We present Black Box, a case study application that uses Crypto-Book for accountable anonymous whistle-blowing.  ...  The client user logs into an online social networking site such as Facebook, and is provided with an OAuth token by the Facebook (or other social networking site) API.  ... 
doi:10.1145/2535771.2535798 dblp:conf/hotnets/MaheswaranWF13 fatcat:prbtc4gfmfchffrnxq5335xyxy

A CSA Method for Assigning Client to Servers in Online Social Networks

S. Minaee Jalil, A. khaleghi
2015 Journal of electrical and computer engineering innovations  
This paper deals with the problem of user-server assignment in online social network systems.  ...  Online social network applications such as Facebook, Twitter, or Instagram are built on an infrastructure of servers that enables them to communicate with each other.  ...  INTRODUCTION Online social network applications rely on an infrastructure of servers that facilitate communication among their users [1] .  ... 
doi:10.22061/jecei.2016.451 doaj:5d8b60eadba544a79ab707c5deca71dc fatcat:jh7p5nb7drf25i5pwfwy7xxicu

Development Of Security Detection Model For The Security Of Social Blogs And Chatting From Hostile Users

Shubhankar Gupta
2017 Zenodo  
There has been a significant rise in the number of platforms, both social and professional, such as WhatsApp, Facebook, and Twitter, which allow people to share their experiences, views and knowledge with  ...  Worldwide, a large number of people interact with each other by means of online chatting.  ...  Nowadays, online forums and social networking sites are becoming a platform for business and socially active people to engage with each other for business networking, discussing issues and promoting businesses  ... 
doi:10.5281/zenodo.1211165 fatcat:4wcg7xtgmndkfgjbprakjofrum

Development of Security Detection Model for the Security of Social Blogs and Chatting from Hostile Users

Shubhankar Gupta, Nitin
2017 International Journal of Computer Science & Information Technology (IJCSIT)  
There has been a significant rise in the number of platforms, both social and professional, such as WhatsApp, Facebook, and Twitter, which allow people to share their experiences, views and knowledge with  ...  Worldwide, a large number of people interact with each other by means of online chatting.  ...  Nowadays, online forums and social networking sites are becoming a platform for business and socially active people to engage with each other for business networking, discussing issues and promoting businesses  ... 
doi:10.5121/ijcsit.2017.9504 fatcat:onauzci35vf5fp4phdene3ubbe

Horton: Online Query Execution Engine for Large Distributed Graphs

Mohamed Sarwat, Sameh Elnikety, Yuxiong He, Gabriel Kliot
2012 2012 IEEE 28th International Conference on Data Engineering  
Large graphs are used in many applications, such as social networking. The management of these graphs poses new challenges because such graphs are too large to fit on a single server.  ...  In the demo, we show the functionality of Horton managing a large graph for a social networking application called Codebook, in which a graph models data on software components, developers, development  ...  ACKNOWLEDGEMENT We thank Alan Geller and Jim Larus for their feedback.  ... 
doi:10.1109/icde.2012.129 dblp:conf/icde/SarwatEHK12 fatcat:jr37w3eftbcmxo7oqn4edkkove

Results from a Practical Deployment of the MyZone Decentralized P2P Social Network [article]

Alireza Mahdian, Richard Han, Qin Lv, Shivakant Mishra
2013 arXiv   pre-print
This paper presents MyZone, a private online social network for relatively small, closely-knit communities. MyZone has three important distinguishing features.  ...  Finally, MyZone minimizes deployment cost by minimizing its computation, storage and network bandwidth requirements.  ...  Figure 2 : 2 Deployment diagram for a private social network. Figure 3 : 3 A snapshot of MyZone's client application. management challenges.  ... 
arXiv:1305.0606v1 fatcat:u3ah4p5njjgn5ez2tm4itipppq

PAIDD: a hybrid P2P-based architecture for improving data distribution in social networks

Kai Shuang, Sen Su
2014 Science China Information Sciences  
Rapid growth in social networks (SNs) presents a unique scalability challenge for SN operators because of the massive amounts of data distribution among large number of concurrent online users.  ...  PAIDD fulfills effective data distribution primarily through P2P connectivity and social graph among users but with the help of central servers.  ...  The presence server returns the following information for each online peer. IP, Port, Network Type, Content ID, Public Key .  ... 
doi:10.1007/s11432-014-5084-x fatcat:34hzeyxjgjarzesqrizrr4zsaa

Privacy-preserving photo sharing based on a secure JPEG

Lin Yuan, Pavel Korshunov, Touradj Ebrahimi
2015 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)  
Sharing photos online is a common activity on social networks and photo hosting platforms, such as Facebook, Pinterest, Instagram, or Flickr.  ...  We demonstrate the proposed architecture with a prototype mobile iOS application called ProShare that offers scrambling as the privacy protection tool for a selected region in a photo, secure access to  ...  ACKNOWLEDGMENT This work has been conducted in the framework of the Swiss SERI C12.0081, Eurostars ToFuTV, and EC funded Network of Excellence VideoSense.  ... 
doi:10.1109/infcomw.2015.7179382 dblp:conf/infocom/YuanKE15 fatcat:ithkv3y2inas5p52y4d4jrdbfu

Confidant: Protecting OSN Data without Locking It Up [chapter]

Dongtao Liu, Amre Shakimov, Ramón Cáceres, Alexander Varshavsky, Landon P. Cox
2011 Lecture Notes in Computer Science  
Online social networks (OSNs) are immensely popular, but participants are increasingly uneasy with centralized services' handling of user data.  ...  Confidant replicates a user's data on servers controlled by her friends. Because data is stored on trusted servers, Confidant allows application code to run directly on these storage servers.  ...  Introduction Online social networks (OSNs) such as Facebook, MySpace, and Twitter have enhanced the lives of millions of users worldwide.  ... 
doi:10.1007/978-3-642-25821-3_4 fatcat:3vzwk6j6ubga3ezppxr55e27xq

Model-Based Groupware Solution for Distributed Real-Time Collaborative 4D Planning through Teamwork

Wei Zhou, Panagiotis Georgakis, David Heesom, Xiandong Feng
2012 Journal of computing in civil engineering  
Tekla Structures applies the master/working model to realize model control in its server/client applications (Tekla 2010).  ...  Despite their advancements in cutting-edge applications using 3D models (both CAD and BIM), none of the above examples have discussed model-based groupware for distributed collaboration, which still remains  ...  This flexibility enables 4DX client to be applicable for both offline and online conditions. System Validation The system validation was performed in a truly geographically distributed condition.  ... 
doi:10.1061/(asce)cp.1943-5487.0000153 fatcat:2pp5324uhbdgplbagugwzbdgyy

Secure JPEG scrambling enabling privacy in photo sharing

Lin Yuan, Pavel Korshunov, Touradj Ebrahimi
2015 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)  
With the popularization of online social networks (OSNs) and smart mobile devices, photo sharing is becoming a part of people' daily life.  ...  An unprecedented number of photos are being uploaded and shared everyday through online social networks or photo hosting services, such as Facebook, Twitter, Instagram, and Flickr.  ...  Recipient-side Operation There are two ways for a recipient to view a photo: (i) via a client application on the device, and (ii) via a URL posted on social networks.  ... 
doi:10.1109/fg.2015.7285022 dblp:conf/fg/YuanKE15 fatcat:fmop57jegzemxdsqwq7lxjbdum
« Previous Showing results 1 — 15 out of 19,693 results