Many trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology. Consider the large size of the outsourced electronic data and the client’s constrained resource capability, the core of the problem can be generalized as how can the client find an efficient way to perform periodical […]
The Method is applied to correction of spelling errors in queries Reformulation
This paper addresses string transformation, which is an essential problem, in many applications. In natural language processing, pronunciation generation, spelling error correction, word transliteration, and word stemming can all be formalized as string transformation. String transformation can also be used in query reformulation and query suggestion in search. In data mining, string transformation can be […]
Trust information is dependent to the Structure of p2p network
A trust model for P2P networks is presented, in which a peer can develop a trust network in its proximity. A peer can isolate malicious peers around itself as it develops trust relationships with good peers. Two context of trust, service and recommendation contexts, are defined to measure capabilities of peers in providing services and […]
Collaboration framework For Multicloud systems
The recent surge in cloud computing arises from its ability to provide software, infrastructure, and platform services without requiring large investments or expenses to manage and operate them. Clouds typically involve service providers, infrastructure/resource providers, and service users (or clients). They include applications delivered as services, as well as the hardware and software systems providing […]
Inferring user search goals by Clustering Pseudo Documents
A novel approach has been proposed to infer user search goals for a query by clustering its feedback sessions represented by pseudo-documents. The introduce feedback sessions to be analyzed to infer user search goals rather than search results or clicked URLs. Both the clicked URLs and the un clicked ones before the last click are […]
Method for measuring relationships using Generalized flow
To measure implicit relationships between two objects on the Wikipedia information network. The relationship is a more general concept than similarity, we discuss existing methods for measuring either relationships or similarities. A keyword has grown in this decade, while knowledge search has recently been researched to obtain knowledge of a single object and relationships between […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
A Fine Grained Privacy Preserving Location Query Protocol
There are several works achieving privacy-preserving location query, which are based on k-anonymity model. The k-anonymity model has been widely used to protect data privacy. The basic idea is to remove some features such that each item is not distinguishable among other k items. The relevant techniques which achieve k-anonymity of data cannot be used […]
Encrypted Information Hiding in the Spatial Domain
The concept of encrypted information hiding has been presented. The use of cryptographic algorithms together with steganography and watermarking methods make it almost impossible for interceptor to recover the encrypted hidden data as this requires the interceptor to detect the existence of the information before attempting to decrypt it. To recover the original data, the […]
- 1
- 2
- 3
- …
- 7
- Next Page »