Cooperative Caching Strategy For Provisioning Cost Minimization In Social Wireless Networks(Swnet’s)
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. Electronic object caching in such social wireless networks (SWNETs)are capable to diminish the content provisioning cost which depends greatly on the service and pricing dependences amide range of stakeholders together with content providers (CP), network service providers and End Consumers (EC). Drawing inspiration from Amazon’s Kindle electronic book delivery business, this paper build up practical network, service and pricing models which are then used for creating two object caching approaches for diminishing content provisioning costs in networks with homogenous and assorted object demands. The paper createslogical and replication models for analyzing the proposed caching approachesin the presence of selfish users that diverge from network-wide cost-optimal policies.
Authors and Affiliations
P Nagaraju, Rajesh Babu Nagineni
Multiple View Point on Cluster Analysis
The clustering methods have to assume some cluster relationship among the data objects that they are applies on. Similarity between a pair of objects can be defines either explicitly or implicitly. In this paper we i...
Distributed Hash Table (DHT) Based Clone Detection In WSN’s
Distributed Hash Table (DHT) by which a completely decentralized, key-based caching and checking system is created to catch cloned nodes efficiently. The protocol arrangement on competent storage utilization and emin...
An Application of Integrated Interface Schema (IIS) Over Multiple WDBS to Enhance Data Unit Annotation
The data unit’s revisits from the fundamental database are typically programmed into the result pages vigorously for human browsing. For the preset data units to be appliance process capable which is necessary for ma...
Securing SMS-based approach for two factor authentication
Nowadays most of the institution faces a huge problem related to security. Most of the institution uses the traditional way to provide authentication. That means most them are use passwords as an authentication mechan...
Content-based image retrieval using DWT based feature extraction and texture, shape and color features
Content Based Image Retrieval (CBIR) is the retrieval of images based on visual features such as colour, texture and shape. In this paper, we propose the algorithm on the basis of extraction and matching of color and...