Proposed a method for learning regular expression patterns of URLs that lead a crawler from an entry page to target pages. Target pages were found through comparing DOM trees of pages with a pre-selected sample target page. It is very effective but it only works for the specific site from which the sample page is […]
FOCUS A SUPERVISED FORUM CRAWLER
Internet forums are important platforms where users can request and exchange information with others. For example, the Trip Advisor Travel Board is a place where people can ask and share travel tips. Due to the richness of information in forums, researchers are increasingly interested in mining knowledge from them. Tried to mine business intelligence from […]
MERGING AND DISTANCE BROWSING
The information retrieval R-tree (IR2- tree) which is the state of the art for answering the nearest neighbor queries defined explains an alternative solution based on the inverted index. the IR2-tree combines the Rtree with signature files. Next, we will review what is a signature file before explaining the details of IR2-trees. Our discussion assumes […]
THE SPATIAL INVERTED INDEX
A spatial database manages multidimensional objects (such as points, rectangles, etc.), and provides fast access to those objects based on different selection criteria. The importance of spatial databases is reflected by the convenience of modeling entities of reality in a geometric manner. For example, locations of restaurants, hotels, hospitals and so on are often represented […]
Dynamic Operations on the Outsourced Data
The dynamic operations in the proposed scheme are performed at the block level via a request in the general form Existing research close to our work can be found in the areas of integrity verification of outsourced data, cryptographic file systems in distributed networks, and access control of outsourced data. Different variations of PDP protocols […]
Cloud computing data storage system model
Cloud computing has received considerable attention from both academia and industry due to a number of important advantages including: cost effectiveness, low management overhead, immediate access to a wide range of applications, flexibility to scale up and down information technology (IT) capacity, and mobility where customers can access information wherever they are, rather than having […]
System Adversary Model and Preliminaries
The basic idea of blind vector transformation protocol is allowing two untrusted parties to transform two vectors into the blind ones by following a series of private and identical steps, e.g., adding a random vector, shuffling in the same order. Since the transformation follows the same step, the matching results (e.g. the number of matched […]
Proposed Privacy Preserving and Fairness Aware Friend Matching Protocol
Mobile online social networks have gained tremendous momentum in the recent years due to both the wide proliferation of mobile devices such as smartphones and tablets as well as the ubiquitous availability of network services. Moreover, the positioning technologies such as GPS, and Wireless localization techniques for mobile devices have made both the generation and […]
Privacy-Preserving Public Auditing Scheme
To achieve privacy-preserving public auditing, we propose to uniquely integrate the homomorphic linear authenticator with random masking technique. In our protocol, the linear combination of sampled blocks in the server’s response is masked with randomness generated the server. With random masking, the TPA no longer has all the necessary information to build up a correct […]
A secure cloud storage system Supporting privacy-preserving public auditing
Cloud Computing has been envisioned as the next-generation information technology (IT) architecture for enterprises, due to its long list of unprecedented advantages in the IT history: on-demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk . As a disruptive technology with profound implications, Cloud Computing is […]
- « Previous Page
- 1
- …
- 34
- 35
- 36
- 37
- 38
- …
- 108
- Next Page »