Cloud Computing is related to identity based secure distributed data storage (IBSDDS) schemes. CLOUD computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS. In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced […]
Group key management (GKM) in mobile communication
The most important concerns is how to minimize the communication overhead when the shared GK is updated among the subscribers. Treebased KM, one class of GKM, has received considerable attention from many researchers since the amount of overhead for group rekeying is proportional to the logarithm of the group size. Many researchers have proposed new […]
HIGEN MINER Algorithm Pseudocode
Frequent itemset mining has been first proposed in, in the context of market basket analysis, as the first step of the association rule extraction process. The problem of discovering relevant changes in the history of itemsets and association rules has been already addressed by a number of research papers ,Active data mining was the first […]
Mobile users to collect the network-wide data
We consider the problem of ubiquitous data collection by the mobile user in a wireless sensor network. The mobile user uses a handheld device to communicate with sensor nodes in the network. The mobile user roams within the network and instantly accesses network-wide data on a need basis. For instance, in the aforementioned GreenOrbs project, […]
CLASSIFICATION OF ANALYSIS- CLUSTERING PATTERN DISCRIMINATIVE ALGORITHMS
A natural environment, the high dimensional measurement signals, lying in the F-dimensional measurement space, usually represent patterns residing in a much lower, D- dimensional subspace embedded in the ambient measurement space. Subclass discriminant analysis (MSDA) and restricted Gaussian model is first presented, and then two further discriminant analysis (DA) methods, fractional step MSDA (FSMSDA) and […]
Hyperparameter Learning—Beam Sampling for the iHCRF
Hidden conditional random fields (HCRFs) are discriminative models that learn the joint distribution of a class label and a sequence of latent variables conditioned on a given observation sequence, with dependencies among latent variables expressed by an undirected graph. HCRFs learn not only the hidden states that discriminate one class label from all the others, […]
FoCUS Modules of Index And Thread URL Detection
Internet forums are important platforms where users can request and exchange information with thers. The TripAdvisor Travel Board is a place where people can ask and share travel tips. Due to the richness of information in forums, researchers are increasingly interested in mining knowledge from them. To harvest knowledge from forums, their contents have to […]
Structured prediction using generalized p-block norm regularization
Structured prediction has been successfully applied to problems with strong interdependencies among output variables. In the realm of natural language processing (NLP), various tasks are formulated into structured prediction problems. Exist exact inference methods for sequences and trees. For tasks with general output structures, e.g., the pairwise fully connected undirected graph, the exact inference problem […]
Cluster consensus in discrete-time networks of multi-agents with inter-cluster nonidentical inputs
The multi-agent systems have broad applications. The consensus problems of multi-agent systems have attracted increasing interests from many fields, such as physics, control engineering, and biology. In network of agents, consensus means that all agents will converge to some common state. A consensus algorithm is an interaction rule how agents update their states. The consensus […]
A Quantitative Approach to Input Generation in Real-Time Testing of Stochastic Systems
The testing process, an implementation is exercised under controlled conditions with the intent of observing deviations with respect to the expected behavior. The development of reactive and real-time systems, this often relies on the execution of test-suites derived from abstractions that focus on finite-state and timed behavior, with the aim of revealing defects related to […]