The recent surge in cloud computing arises from its ability to provide software, infrastructure, and platform services without requiring large investments or expenses to manage and operate them. Clouds typically involve service providers, infrastructure/resource providers, and service users (or clients). They include applications delivered as services, as well as the hardware and software systems providing […]
Inferring user search goals by Clustering Pseudo Documents
A novel approach has been proposed to infer user search goals for a query by clustering its feedback sessions represented by pseudo-documents. The introduce feedback sessions to be analyzed to infer user search goals rather than search results or clicked URLs. Both the clicked URLs and the un clicked ones before the last click are […]
A proposal for direct and indirect Discrimination prevention
The wide deployment of information systems based on data mining technology in decision making, the issue of antidiscrimination in data mining did not receive much attention until 2008. Some proposals are oriented to the discovery and measure of discrimination. Others deal with the prevention of discrimination. The approach is based on mining classification rules (the […]
Impact of Cost Functions On Server Requirements
There are mainly three threads of this paper in server reqirements , namely cloud computing, scheduling with deadline constraints, and optimization. Cloud computing has recently changed the landscape of Internet based computing, a shared pool of configurable computing resources (networks, servers, storage) can be rapidly provisioned and released to support multiple services within the same […]
Single Intermediate Dataset Privacy Representation
The research on privacy protection in cloud, intermediate dataset privacy preserving and Priva-cy-Preserving Data Publishing (PPDP). Currently, encryption is exploited by most existing research to ensure the data privacy in cloud . Although encryption works well for data privacy in these approaches, it is necessary to encrypt and decrypt datasets frequently in many applications. Encryption […]
Autoregressive Moving Average Model
Mobile social networks as emerging social communication platforms have attracted great attention recently, and their mobile applications have been developed and implemented pervasively. In mobile social networking applications, profile matching acts as a critical initial step to help users, especially strangers, initialize conversation with each other in a distributed manner. Introduced a distributed mobile communication […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
Thyristor-controlled series compensator and unified Power-flow controller
Increased demand of bulk power transfer in the modern power network has led to an increased focus on transmission constraints and alleviation. Flexible ac transmission systems (FACTS) devices offer a versatile alternative to conventional reinforcement methods. Among them, the thyristor-controlled series compensator (TCSC) and unified power-flow controller (UPFC) are important FACTS devices, which are used […]
The Rapid Development Of Online Reputation Systems
Online reputation systems are playing increasingly important roles in influencing people’s online purchasing/downloading decisions. The manipulations against such systems which overly inflate or deflate reputation scores of online items are evolving rapidly. For example, for just $9.99, a video on YouTube could receive 30 “I like” ratings or 30 real user comments provided by “IncreaseYouTubeViews.com”. […]
A Fine Grained Privacy Preserving Location Query Protocol
There are several works achieving privacy-preserving location query, which are based on k-anonymity model. The k-anonymity model has been widely used to protect data privacy. The basic idea is to remove some features such that each item is not distinguishable among other k items. The relevant techniques which achieve k-anonymity of data cannot be used […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- 6
- …
- 13
- Next Page »