A novel approach has been proposed to infer user search goals for a query by clustering its feedback sessions represented by pseudo-documents. The introduce feedback sessions to be analyzed to infer user search goals rather than search results or clicked URLs. Both the clicked URLs and the un clicked ones before the last click are […]
Impact of Cost Functions On Server Requirements
There are mainly three threads of this paper in server reqirements , namely cloud computing, scheduling with deadline constraints, and optimization. Cloud computing has recently changed the landscape of Internet based computing, a shared pool of configurable computing resources (networks, servers, storage) can be rapidly provisioned and released to support multiple services within the same […]
Interesting and efforts on cloud Computing and release services
Cloud computing is a hot topic in recent years. It exhibits the following key characteristics: agility, low cost in using, device and location independence, virtualization, reliability, scalability and elasticity, performance and etc. All those features show fascinating benefit to companies. As they can get free from the worry about the investment on hardware and can […]
Single Intermediate Dataset Privacy Representation
The research on privacy protection in cloud, intermediate dataset privacy preserving and Priva-cy-Preserving Data Publishing (PPDP). Currently, encryption is exploited by most existing research to ensure the data privacy in cloud . Although encryption works well for data privacy in these approaches, it is necessary to encrypt and decrypt datasets frequently in many applications. Encryption […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
Thyristor-controlled series compensator and unified Power-flow controller
Increased demand of bulk power transfer in the modern power network has led to an increased focus on transmission constraints and alleviation. Flexible ac transmission systems (FACTS) devices offer a versatile alternative to conventional reinforcement methods. Among them, the thyristor-controlled series compensator (TCSC) and unified power-flow controller (UPFC) are important FACTS devices, which are used […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
A Fine Grained Privacy Preserving Location Query Protocol
There are several works achieving privacy-preserving location query, which are based on k-anonymity model. The k-anonymity model has been widely used to protect data privacy. The basic idea is to remove some features such that each item is not distinguishable among other k items. The relevant techniques which achieve k-anonymity of data cannot be used […]
Encrypted Information Hiding in the Spatial Domain
The concept of encrypted information hiding has been presented. The use of cryptographic algorithms together with steganography and watermarking methods make it almost impossible for interceptor to recover the encrypted hidden data as this requires the interceptor to detect the existence of the information before attempting to decrypt it. To recover the original data, the […]
- 1
- 2
- 3
- …
- 14
- Next Page »