This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable...
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-...
This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes three new schemes that address cost-efficiency, user incentives, and allocation fairness with regard to different scheduling contexts. The first scheme, taking the Amazon EC2(TM) market as a case of study, investigates the optimal resource rental planning models based on linear integer programming and stochastic optimization techniques. This model is useful to explore the interaction between the cloud infrastructure provider and the cloud...
This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes ...
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research...
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or...
With the increasing popularization of personal hand-held mobile devices, more people use them to establish network connectivity and to query and share data among themselves in the absence of network infrastructure, creating mobile social networks (MSNet). Since users are only intermittently connected to MSNets, user mobility should be exploited to bridge network partitions and forward data. Currently, data route/forward approaches for such intermittently connected networks are commonly "store-carry-and-forward" schemes, which exploit the physical user movements to carry data around the...
With the increasing popularization of personal hand-held mobile devices, more people use them to establish network connectivity and to query and share...
The Web has become a rich source of personal information in the last few years. People twitter, blog, and chat online. Current feelings, experiences or latest news are posted. For instance, first hints to disease outbreaks, customer preferences, or political changes could be identified with this data.
Surveillance or early warning systems enable such detection of changes and support humans in getting information on changing situations. However, the variety of data that could be considered for surveillance is immense, ranging from sensor-measured values to collected counts and...
The Web has become a rich source of personal information in the last few years. People twitter, blog, and chat online. Current feelings, experience...
This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs...
This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile...
We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others. In this brief, "trust context" is defined as the system level description of how the trust evaluation process unfolds.
Networks today are part of almost all human activity, supporting and shaping it. Applications increasingly incorporate new interdependencies and new trust contexts. Social networks connect people and organizations...
We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining ma...
Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication....
Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to moder...
Variational Regularization of 3D Data provides an introduction to variational methods for data modelling and its application in computer vision. In this book, the authors identify interpolation as an inverse problem that can be solved by Tikhonov regularization. The proposed solutions are generalizations of one-dimensional splines, applicable to n-dimensional data and the central idea is that these splines can be obtained by regularization theory using a trade-off between the fidelity of the data and smoothness properties.
As a foundation, the authors present a comprehensive guide to...
Variational Regularization of 3D Data provides an introduction to variational methods for data modelling and its application in computer vision. In...
This brief introduces the fundamental theory and development of managing radio resources using a water-filling algorithm that can optimize system performance in wireless communication. Geometric Water-Filling (GWF) is a crucial underlying tool in emerging communication systems such as multiple input multiple output systems, cognitive radio systems, and green communication systems. Early chapters introduce emerging wireless technologies and provide a detailed analysis of water-filling. The brief investigates single user and multi-user issues of radio resource management, allocation of...
This brief introduces the fundamental theory and development of managing radio resources using a water-filling algorithm that can optimize system perf...