Home / EG Comp Lab

EG Comp Lab

Optimal Bandwidth Assignment for Multiple-Description-Coded Video

Optimal Bandwidth Assignment for Multiple-Description-Coded Video Abstract: In video streaming over multicast network, user bandwidth requirement is often heterogeneous possibly with orders of magnitude difference (say, from hundreds of kb/s for mobile devices to tens of Mb/s for high-definition TV). Multiple description coding (MDC) can be used to address this …

Read More »

Keyword Query Routing

ABSTRACT: Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over all sources. We propose a novel method for computing top-k routing plans based on their …

Read More »

BestPeer A Peer to Peer Based Large Scale Data Processing Platform

BestPeer A Peer to Peer Based Large Scale Data Processing PlatformBestPeer A Peer to Peer Based Large Scale Data Processing Platform ABSTRACT: The corporate network is often used for sharing information among the participating companies and facilitating collaboration in a certain industry sector where companies share a common interest. It …

Read More »

Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

ABSTRACT: Mining opinion targets and opinion words from online reviews are important tasks for fine-grained opinion mining, the key component of which involves detecting opinion relations among words. To this end, this paper proposes a novel approach based on the partially-supervised alignment model, which regards identifying opinion relations as an …

Read More »

SR-TOWARDS ONLINE SHORTEST PATH

ABSTRACT: The online shortest path problem aims at computing the shortest path based on live traffic circumstances. This is very important in modern car navigation systems as it helps drivers to make sensible decisions. To our best knowledge, there is no efficient system/solution that can offer affordable costs at both …

Read More »

DoubleGuard: Detecting Intrusions in Multitier Web Applications

ABSTRACT: Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multitier design wherein the web server runs the application front-end logic and …

Read More »

A Hybrid Cloud Approach for Secure Authorized Deduplication

ABSTRACT: Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has …

Read More »

SigFree: A Signature-free Buffer Overflow Attack Blocker

Abstract: This project propose SigFree, a realtime, signature-free, out-ofthe-box, application layer blocker for preventing buffer overflow attacks, one of the most serious cyber security threats. SigFree can filter out code-injection buffer overflow attack messages targeting at various Internet services such as web service. Motivated by the observation that buffer overflow …

Read More »

Bandwidth Recycling in IEEE 802.16 Networks

Bandwidth Recycling in IEEE 802.16 Networks Abstract IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of  service (QoS). Bandwidth is reserved for each application to ensure the QoS.For variable bit rate (VBR) applications, however, it is difficult for the subscriber stations (SSs) to predict the …

Read More »