Optimal Object Placement Policies To Minimize The NetworkWide Content Provisioning Cost
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. Electronic object caching in such social wireless networks (SWNETs)are capable to diminish the content provisioning cost which depends greatly on the service and pricing dependences amide range of stakeholders together with content providers (CP), network service providers and End Consumers (EC). Drawing inspiration from Amazon’s Kindle electronic book delivery business, this paper build up practical network, service and pricing models which are then used for creating two object caching approaches for diminishing content provisioning costs in networks with homogenous and assorted object demands. The paper creates logical and replication models for analyzing the proposed caching approaches in the presence of selfish users that diverge from network-wide cost-optimal policies.
Authors and Affiliations
Ravikala. Raveendra| Department of Computer Science And Engineering Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem, A.P,India, ravindra.ravikala.1236@gmail.com, G. Raju| Department of Computer Science And Engineering Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem, A.P,India, gumpularaju@gmail.com, K. T. V Subbarao| Department of Computer Science And Engineering Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem, A.P,India, ogidi@rediffmail.com
Mainstream issue in data mining, which is called "high-utility itemset mining" or all the more for the most part utility mining. High Utility Itemsets which are itemsets having an utility gathering a client determine...
Secure Cloud Email System On Privacy Protocol And Identity-Based Encryption
A flexible primitive alluded to as conditional identity-based broadcast PRE (CIBPRE) and formalizes its semantic security. CIBPRE enables a sender to encode a message to numerous collectors by indicating these benefi...
Empowering Auditing Scheme through more Security signatures in cloud computing
Maintaining data determined quality in public cloud acts an essential measure in cloud computing. Cloud storage auditing settles the multifaceted nature of data dependability in public cloud. In advance auditing prot...
Evaluate The Quality Of Marked Decrypted Image Quantitatively To Encrypted Images Using Rdh
Encryption is an effectual and popular means as it converts the original and significant content to incomprehensible one. Even though few RDH methods in encrypted images have been published yet there are some talente...
Privacy Preservation and traceability support using Public Auditing Mechanism
as future enhancement, we enhance the Oruta system in two interesting problems we will continue the study for our future work. One of them is traceability, which means the ability for the group manager (i.e., the ori...