Search results for "centralized"

showing 10 items of 38 documents

Privacy-preserving data allocation in decentralized online social networks

2016

International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…

Service (systems architecture)ExploitComputer sciencePrivacy policyControl (management)02 engineering and technologyPeer-to-peercomputer.software_genreComputer securityTheoretical Computer ScienceSet (abstract data type)[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Privacy policySocial networkSettore INF/01 - Informaticabusiness.industryComputer Science (all)020206 networking & telecommunicationsService providerDecentralized online social network Data availability Privacy policy Peer-to-peerData availabilityPeer-to-peerDecentralized online social network020201 artificial intelligence & image processingbusinesscomputerComputer network
researchProduct

Analysis of Users Behaviour from a Movie Preferences Perspective

2018

Despite their tremendous popularity, Online Social Networks (OSNs) have several issues related to the privacy of social users. These issues have motivated researchers to develop OSN services that take advantage of the decentralized platforms (such as P2P systems or opportunistic networks). Decentralized Online Social Networks (DOSNs) need specific approaches to manage the decentralization of social data. In particular, data availability is one of the main issues and current proposals exploit properties of the social relationships to manage it. At the best of our knowledge, there are no proposals which exploit similarity between users, expressed with the term homophily. Homophily has been we…

Settore INF/01 - InformaticaExploitComputer Networks and CommunicationsPerspective (graphical)020206 networking & telecommunications02 engineering and technologyHomophilyDecentralizationPopularityData scienceDecentralized Online Social NetworksData availabilityHomophilyTerm (time)Data availabilitySimilarity (psychology)0202 electrical engineering electronic engineering information engineeringDecentralized Online Social Network020201 artificial intelligence & image processingData availability; Decentralized Online Social Networks; Homophily; Computer Networks and Communications
researchProduct

Exploiting community detection to recommend privacy policies in decentralized online social networks

2018

The usage of Online Social Networks (OSNs) has become a daily activity for billions of people that share their contents and personal information with the other users. Regardless of the platform exploited to provide the OSNs’ services, these contents’ sharing could expose the OSNs’ users to a number of privacy risks if proper privacy-preserving mechanisms are not provided. Indeed, users must be able to define its own privacy policies that are exploited by the OSN to regulate access to the shared contents. To reduce such users’ privacy risks, we propose a Privacy Policies Recommended System (PPRS) that assists the users in defining their own privacy policies. Besides suggesting the most appro…

Settore INF/01 - InformaticaExploitbusiness.industryEnd userComputer sciencePrivacy policyInternet privacy020206 networking & telecommunications02 engineering and technologyPrivacy policiesRecommender systemTheoretical Computer ScienceRecommendation systemPrivacyComputer Science0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingDecentralized online social networksPrivacy policiebusinessSet (psychology)Personally identifiable informationDecentralized online social networks; Privacy; Privacy policies; Recommendation system; Security
researchProduct

A privacy-aware framework for decentralized online social networks

2015

Online social networks based on a single service provider suffer several drawbacks, first of all the privacy issues arising from the delegation of user data to a single entity. Distributed online social networks (DOSN) have been recently proposed as an alternative solution allowing users to keep control of their private data. However, the lack of a centralized entity introduces new problems, like the need of defining proper privacy policies for data access and of guaranteeing the availability of user's data when the user disconnects from the social network. This paper introduces a privacy-aware support for DOSN enabling users to define a set of privacy policies which describe who is entitle…

Social networkDelegationbusiness.industryComputer sciencePrivacy policymedia_common.quotation_subjectControl (management)Computer Science (all)Service providerComputer securitycomputer.software_genreTheoretical Computer ScienceSet (abstract data type)Data availabilityData accessPrivacyDecentralized online social network Privacy Data availabilityDecentralized online social networkbusinesscomputermedia_common
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct

Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game

2012

Published version of an article in the journal: Applied Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/s10489-012-0346-z The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, Quality of Service (QoS) control, game playing, and resource allocation, can be solved …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Bayesian learningVDP::Technology: 500::Information and communication technology: 550::Computer technology: 551Optimization problembusiness.industryComputer scienceGoore GameBayesian inferenceMulti-armed banditquality of service controldecentralized decision makingArtificial IntelligenceInfluence diagramResource allocationArtificial intelligencebandit problemswireless sensor networksbusinessWireless sensor networkOptimal decisionApplied Intelligence
researchProduct

Semi-decentralized strategies in structural vibration control

2011

Published version of an article published in the journal: Modeling, Identification and Control. Also available from the publisher at: http://dx.doi.org/10.4173/mic.2011.2.2 In this work, the main ideas involved in the design of overlapping and multi-overlapping controllers via the Inclusion Principle are discussed and illustrated in the context of the Structural Vibration Control of tall buildings under seismic excitation. A detailed theoretical background on the Inclusion Principle and the design of overlapping controllers is provided. Overlapping and multi-overlapping LQR controllers are designed for a simplied five-story building model. Numerical simulations are conducted to asses the pe…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413multi-overlapping controllers overlapping controllers semi-decentralized control structural vibration controlEngineeringDecentralized controlStructural Vibration ControlControl (management)Edificis -- Vibració:Enginyeria civil::Materials i estructures [Àrees temàtiques de la UPC]lcsh:QA75.5-76.95Control d'estructures (Enginyeria)Earthquake resistant designStructural vibrationBuildings -- VibrationVDP::Technology: 500::Materials science and engineering: 520business.industryDisseny antisísmicControl engineeringComputer Science ApplicationsIdentification (information)Control and Systems EngineeringModeling and SimulationBuildings--Vibrationlcsh:Electronic computers. Computer scienceStructural control (Engineering)businessSoftware
researchProduct

Optimal passive-damping design using a decentralized velocity-feedback H-infinity approach

2012

In this work, a new strategy to design passive energy dissipation systems for vibration control of large structures is presented. The method is based on the equivalence between passive damping systems and fully decentralized static velocity-feedback controllers. This equivalence allows to take advantage of recent developments in static output-feedback control design to formulate the passive-damping design as a single optimization problem with Linear Matrix Inequality constraints. To illustrate the application of the proposed methodology, a passive damping system is designed for the seismic protection of a five-story building with excellent results. Peer Reviewed

Work (thermodynamics)EngineeringOptimization problemDecentralized controlStructural Vibration Control:Informàtica::Automàtica i control [Àrees temàtiques de la UPC]Static output-feedbackVibration control:Enginyeria civil::Materials i estructures [Àrees temàtiques de la UPC]Feedback control systemsMatrius (Matemàtica)lcsh:QA75.5-76.95Structural vibration controlControl d'estructures (Enginyeria):93 Systems Theory; Control [Classificació AMS]Control theoryControlMatrix inequalitiesEquivalence (measure theory):93 Systems Theory [Classificació AMS]business.industryOptimal passive dampingLinear matrix inequalityControl engineeringDissipationDecentralised systemComputer Science ApplicationsH-infinity methods in control theoryControl and Systems EngineeringModeling and SimulationSistemes de control per retroacciólcsh:Electronic computers. Computer scienceStructural control (Engineering)businessSoftware
researchProduct

Modeling and Coordination of interconnected microgrids using distributed artificial intelligence approaches

2019

As renewable sources penetrate the current electrical system to relief global warming and energy shortage, microgrid (MG) emerges to reduce the impact of intermittent generation on the utility grid. Additionally, it improves the automation and intelligence of the power grid with plug-and-play characteristics. Inserting more MGs into a distribution network promotes the development of the smart grid. Thus MG networks existing in the power system are in prospect. Coordinating them could gain a system with high reliability, low cost, and strong resistance to electrical faults. Achieving these profits relies on developed technologies of communication, control strategy, and corresponding algorith…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]Artificial intelligenceDecentralized controlMicrogridCommande décentralisée[SPI.OTHER] Engineering Sciences [physics]/OtherEnergy managementMulti-Agent systemIntelligence artificielleGestion de l'énergieMicro-Réseaux
researchProduct

Conception of a territorial observation and prospective tool for energy. The case of fuelwood.

2008

International audience; Decentralized energy planning has been emerged in France since the last three decades especially due to the development of renewable energies. One corollary is the increase of local actors' role in energy and land planning. In order to help them carrying out efficient policies, decision support systems (DSS) have been developed. In this paper, the authors deal with a DSS applied to fuelwood sector.

[SHS.HISPHILSO]Humanities and Social Sciences/History Philosophy and Sociology of Sciencesactorssustainable development[SHS.HISPHILSO] Humanities and Social Sciences/History Philosophy and Sociology of Sciencesfuel-woodterritorial intelligence[ SHS.HISPHILSO ] Humanities and Social Sciences/History Philosophy and Sociology of Sciencesdecision support system (DSS)decentralized energy planningterritorial observation tools
researchProduct