Blättern Fakultät für Mathematik und Informatik (inkl. GAUSS) nach "Fu, Xiaoming Prof. Dr." Betreuer
Anzeige 1-20 von 27
-
MoniSys: Sensing, Communication, and Video Analysis in UAV Monitoring System
(2022-09-30)Over the past 20 years, visual data has taken over every aspect of our lives, and camera deployment has experienced an unprecedented increase. For example, in the USA and UK, there is one camera for every 8 people used for ... -
User identification and community exploration via mining big personal data in online platforms
(2021-10-19)User-generated big data mining is vital important for large online platforms in terms of security, profits improvement, products recommendation and system management. Personal attributes recognition, user behavior prediction, ... -
Imbalance Learning and Its Application on Medical Datasets
(2021-05-28)To gain more valuable information from the increasing large amount of data, data mining has been a hot topic that attracts growing attention in this two decades. One of the challenges in data mining is imbalance learning, ... -
User Attribute Inference via Mining User-Generated Data
(2020-12-03)User attributes refer to a person's various demographic characteristics, like income, education, job, age, gender, socioeconomic status (SES), etc. User attributes play an important role in many research areas like sociology ... -
PHOENIX: A Premise to Reinforce Heterogeneous and Evolving Internet Architectures with Exemplary Applications
(2020-12-02)The Internet was designed primarily for sharing expensive resources through establishing point-to-point connection using dedicated IP addresses. However, it has since evolved both in complexity and its number of users. ... -
A Secure and Privacy-Friendly IP-based Emergency Services Architecture
(2019-12-20)Emergency services support is one of the most valued features of the public switched telephone network. With the transition to IP-based communication the opportunity to re-design the emergency services communication ... -
Identification of Online Users' Social Status via Mining User-Generated Data
(2019-09-11)With the burst of available online user-generated data, identifying online users’ social status via mining user-generated data can play a significant role in many commercial applications, research and policy-making in many ... -
Efficient Data Management and Policy Composition for Software-defined Networking
(2019-08-29)Network softwarization changes the way how should networks be managed. Introducing Software-defined Networking in the last decade helps network administrators focus on network management and write optimized applications ... -
Architectural Support for Implementing Service Function Chains in the Internet
(2019-03-01)Network Functions (NFs) have a crucial role in today’s Internet infrastructure. They provide additional services on top of plain connectivity such as content caching, Network Address Translation (NAT), etc. However, ... -
Resource Management for Efficient, Scalable and Resilient Network Function Chains
(2018-08-10)Networks, the basis of the modern connected world, have evolved beyond the con- nectivity services. Network Functions (NFs) or traditionally the middleboxes are the basis of realizing different types of services such as ... -
An Intelligent and Powerful Data Plane Support To Enhance Future Communication
(2018-07-06)Users are primarily interested in obtaining content and do not care much about where they obtain the Content from. But, the Internet as it is currently designed is very host-centric and places importance on the hosts ... -
Automated Provisioning of Fairly Priced Resources
(2018-07-03)In recent times, cloud service providers are increasingly offering more complex services. These complex services are heterogeneous and composed dynamically from traditional services such as IaaS, SaaS, and PaaS to handle ... -
Triadic Closure and Its Influence in Social Networks
(2016-09-12)Social triad—a group of three people—is one of the simplest and most fundamental social groups, which serves as the basis of social network analysis. Triadic closure, a closing process of an open triad, is a useful ... -
Data-Driven Network Analysis and Applications
(2016-01-08)Data is critical for scientific research and engineering systems. However, data collection procedures are often subject to high cost or heavy loss rate. It is challenging to accurately estimate missing or unobserved data ... -
Dynamic Resource Scheduling in Cloud Data Center
(2015-10-26)Cloud infrastructure provides a wide range of resources and services to companies and organizations, such as computation, storage, database, platforms, etc. These resources and services are used to power up and scale out ... -
A Content-Oriented Architecture for Publish/Subscribe Systems
(2015-04-01)With the user behavior of Internet shifting towards data dissemination and retrieval, Information Centric Networking (ICN) is proposed to suit these demands. ICN treats content as the first-class entity, with nodes exchanging ... -
Towards a Robust and Secure Decentralized Online Social Network
(2015-01-15)The virtually unlimited growth of popular Online Social Networks (OSNs) is often accompanied by severe violations of their users' privacy and intellectual property rights. Both problems are rooted in the centralized ... -
Online Social Network Data Placement over Clouds
(2014-08-11)Internet services today are often deployed and operated in data centers and clouds; users access and use the services by connecting to such data centers from their computing devices. For availability, fault tolerance, and ... -
Social-Based Data Routing Strategies in Delay Tolerant Networks
(2014-04-03)Delay Tolerant networks (DTNs) are intermittently connected mobile networks in which the end-to-end paths do not exist. Data delivery in such networks relies upon the contacts that use "store-carry-and-forward" paradigm ... -
Leveraging Email based Social Networks to Prevent Spam: Framework, System Design and Evaluation
(2012-09-26)Spam is still an open problem from the network operator's perspective. The common state-of-the-art strategy is to place filters against spam at the recipient's edge. Although this strategy largely solves the spam problem ...