199 research outputs found

    Operating-system support for distributed multimedia

    Get PDF
    Multimedia applications place new demands upon processors, networks and operating systems. While some network designers, through ATM for example, have considered revolutionary approaches to supporting multimedia, the same cannot be said for operating systems designers. Most work is evolutionary in nature, attempting to identify additional features that can be added to existing systems to support multimedia. Here we describe the Pegasus project's attempt to build an integrated hardware and operating system environment from\ud the ground up specifically targeted towards multimedia

    Cross-system recommendation: user-modelling via social media versus self-declared preferences

    Get PDF
    It is increasingly rare to encounter a Web service that doesnā€™t engage in some form of automated recommendation, with Collaborative Filtering (CF) techniques being virtually ubiquitous as the means for delivering relevant content. Yet several key issues still remain unresolved, including optimal handling of cold starts and how best to maintain user privacy within that context. Recent work has demonstrated a potentially fruitful line of attack in the form of cross system user modelling, which uses features generated from one domain to bootstrap recommendations in another. In this paper we evidence the effectiveness of this approach through direct real-world user feedback, deconstructing a cross-system news recommendation service where user models are generated via social media data. It is shown that even when a relatively naive vector-space approach is used, it is possible to automatically generate user-models that provide statistically superior performance than when items are explicitly filtered based on a userā€™s self-declared preferences. Detailed qualitative analysis of why such effects occur indicate that different models are capturing widely different areas within a userā€™s preference space, and that hybrid models represent fertile ground for future research

    Reputation aware obfuscation for mobile opportunistic networks

    Get PDF
    Ā© 2013 IEEE. Current anonymity techniques for mobile opportunistic networks typically use obfuscation algorithms to hide node's identity behind other nodes. These algorithms are not well suited to sparse and disconnection prone networks with large number of malicious nodes and new opportunistic, adaptive. So, new, opportunistic, adaptive fully localized mechanisms are needed for improving user anonymity. This paper proposes reputation aware localized adaptive obfuscation for mobile opportunistic networks that comprises of two complementary techniques: opportunistic collaborative testing of nodes' obfuscation behaviour (OCOT) and multidimensional adaptive anonymisation (AA). OCOT-AA is driven by both explicit and implicit reputation building, complex graph connectivity analytics and obfuscation history analyses. We show that OCOT-AA is very efficient in terms of achieving high levels of node identity obfuscation and managing low delays for answering queries between sources and destinations while enabling fast detection and avoidance of malicious nodes typically within the fraction of time within the experiment duration. We perform extensive experiments to compare OCOT-AA with several other competitive and benchmark protocols and show that it outperforms them across a range of metrics over a one month real-life GPS trace. To demonstrate our proposal more clearly, we propose new metrics that include best effort biggest length and diversity of the obfuscation paths, the actual percentage of truly anonymised sources' IDs at the destinations and communication quality of service between source and destination
    • ā€¦
    corecore