This paper addresses string transformation, which is an essential problem, in many applications. In natural language processing, pronunciation generation, spelling error correction, word transliteration, and word stemming can all be formalized as string transformation. String transformation can also be used in query reformulation and query suggestion in search. In data mining, string transformation can be […]
Collaboration framework For Multicloud systems
The recent surge in cloud computing arises from its ability to provide software, infrastructure, and platform services without requiring large investments or expenses to manage and operate them. Clouds typically involve service providers, infrastructure/resource providers, and service users (or clients). They include applications delivered as services, as well as the hardware and software systems providing […]
Inferring user search goals by Clustering Pseudo Documents
A novel approach has been proposed to infer user search goals for a query by clustering its feedback sessions represented by pseudo-documents. The introduce feedback sessions to be analyzed to infer user search goals rather than search results or clicked URLs. Both the clicked URLs and the un clicked ones before the last click are […]
Interesting and efforts on cloud Computing and release services
Cloud computing is a hot topic in recent years. It exhibits the following key characteristics: agility, low cost in using, device and location independence, virtualization, reliability, scalability and elasticity, performance and etc. All those features show fascinating benefit to companies. As they can get free from the worry about the investment on hardware and can […]
Autoregressive Moving Average Model
Mobile social networks as emerging social communication platforms have attracted great attention recently, and their mobile applications have been developed and implemented pervasively. In mobile social networking applications, profile matching acts as a critical initial step to help users, especially strangers, initialize conversation with each other in a distributed manner. Introduced a distributed mobile communication […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
Thyristor-controlled series compensator and unified Power-flow controller
Increased demand of bulk power transfer in the modern power network has led to an increased focus on transmission constraints and alleviation. Flexible ac transmission systems (FACTS) devices offer a versatile alternative to conventional reinforcement methods. Among them, the thyristor-controlled series compensator (TCSC) and unified power-flow controller (UPFC) are important FACTS devices, which are used […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
A Fine Grained Privacy Preserving Location Query Protocol
There are several works achieving privacy-preserving location query, which are based on k-anonymity model. The k-anonymity model has been widely used to protect data privacy. The basic idea is to remove some features such that each item is not distinguishable among other k items. The relevant techniques which achieve k-anonymity of data cannot be used […]
The real mobile computing environment in group key management
In next-generation mobile communication, multicast service will be a key application for supporting a large group of subscribers simultaneously. Because multicast transmits data to the group simultaneously, it reduces the communication cost significantly. Since multicast may be vulnerable to an overhearing attack, this efficiency can be achieved only when security or access control is guaranteed; […]
- 1
- 2
- 3
- …
- 6
- Next Page »