Cooperative Caching Strategy For Provisioning Cost Minimization In Social Wireless Networks(Swnet’s)
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. Electronic object caching in such social wireless networks (SWNETs)are capable to diminish the content provisioning cost which depends greatly on the service and pricing dependences amide range of stakeholders together with content providers (CP), network service providers and End Consumers (EC). Drawing inspiration from Amazon’s Kindle electronic book delivery business, this paper build up practical network, service and pricing models which are then used for creating two object caching approaches for diminishing content provisioning costs in networks with homogenous and assorted object demands. The paper createslogical and replication models for analyzing the proposed caching approachesin the presence of selfish users that diverge from network-wide cost-optimal policies.
Authors and Affiliations
P Nagaraju, Rajesh Babu Nagineni
Effective Sharing Of Unstructured Information With Tagging And Reducing Query Workload
Annotation schemes which use attribute-value pairs are usually more expressive because they can hold more information than untyped approaches. A recent work on using more mobile queries that influence such annotation...
Image Compression through Data Representation in Frequency Domain
Data compression is a very important field these days. You can find it in any web page, network devices, application files etc. Its importance has grown during the years as a necessity of storage and time of transpor...
Self-motivated probe forms designed for database Uncertainties
Query form is a standout amongst the most broadly utilized client interfaces for questioning databases. Conventional inquiry structures are planned and precharacterized by engineers or DBA in different data administra...
A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time
Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In...
Survey of Techniques of High Level Semantic Based Image Retrieval
This paper provides a comprehensive survey of the recent technical achievements in the research area of content based image retrieval. Images are being used since many years in all spheres including Antisocial Element...