A comprehensive survey about XML tree patterns, which are nowadays considered crucial in XML querying and its optimization. We first compare TPs from a structural point of view, concluding that the richer a TP is with matching possibilities, the larger the subset of XQuery/XPath it encompasses, and thus the closer to user expectations it is. […]
CPDP Publicly Verifiable Information To Prove A Structure
Many trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology. Consider the large size of the outsourced electronic data and the client’s constrained resource capability, the core of the problem can be generalized as how can the client find an efficient way to perform periodical […]
The Method is applied to correction of spelling errors in queries Reformulation
This paper addresses string transformation, which is an essential problem, in many applications. In natural language processing, pronunciation generation, spelling error correction, word transliteration, and word stemming can all be formalized as string transformation. String transformation can also be used in query reformulation and query suggestion in search. In data mining, string transformation can be […]
Two server password only Authentication and key exchange
Nowdays, passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines and so on. A computer user may require passwords for many purposes: logging in to computer accounts, retrieving e-mail from servers, accessing programs, databases, networks, web sites, […]
The Basis Of Information Entropy
The current state of the art of privacy-preserving techniques in participatory sensing. The first implementation of a privacy aware architecture, named Anony Sense, for the anonymous task allocation and data reporting. From the perspective of cryptography, analyzed the realistic architectural assumptions and privacy requirements, and then provided an instantiation that achieved privacy protection in participatory […]
Trust information is dependent to the Structure of p2p network
A trust model for P2P networks is presented, in which a peer can develop a trust network in its proximity. A peer can isolate malicious peers around itself as it develops trust relationships with good peers. Two context of trust, service and recommendation contexts, are defined to measure capabilities of peers in providing services and […]
Virtualization Technology to Allocate Data Resources Dynamically Based on Cloud Computing
The elasticity and the lack of upfront capital investment offered by cloud computing is appealing to many businesses. There is a lot of discussion on the benefits and costs of the cloud model and on how to move legacy applications onto the cloud platform. Here we study a different problem: how can a cloud service […]
Analysis of a Naive Architecture of Mobile Presence Service
Social network applications are becoming increasingly popular on mobile devices. A mobile presence service is an essential component of a social network application because it maintains each mobile user’s presence information, such as the current status (online/offline), GPS location and network address, and also updates the user’s online friends with the information continually. the system […]
Privacy Preserving Network Publication against Structural Attacks
Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. Recently, researchers have developed privacy models similar to k-anonymity to prevent node re-identification through structure information. However, even when these privacy models are enforced, an attacker may still be able to infer one’s private […]
Presence of Taxonomies In The Discovering Temporal Change Patterns
The steadfast evolution of markets and business environments prompts the need of data mining algorithms to discover significant correlation changes in order to reactively suit product and service provision to customer needs. Change mining, in the context of frequent itemsets, focuses on detecting and reporting significant changes in the set of mined itemsets from one […]