Most previous private matching work are based on the secure multi-party computation (SMC). There are two mainstreams of approaches to solve the private profile-based friending problem. The first category is based on private set intersection (PSI) and private cardinality of set intersection (PCSI). Early work in this category mainly address the private set operation problem […]
Online Anomaly Detection For Practical Scenario
Outlier detection methods have been proposed for Practical Scenario. These existing approaches can be divided into three categories: distribution (statistical), distance and density-based methods. Statistical approaches assume that the data follows some standard or predetermined distributions, and this type of approach aims to find the outliers which deviate form such distributions. Most distribution models are […]
A Hybrid of Surface Patterns Parsing and Classification
Their representation, abstraction, execution, monitoring, and model-checking. In general, our approach does not address the challenges these studies pursue but would support such studies by helping identify the relevant events and temporal constraints. A contract monitoring facility. Their approach involves the Business Contract Language (BCL) as a way to represent and monitor contracts. Their focus […]
Distributed file systems are key building blocks for cloud computing applications
Cloud Computing (or cloud for short) is a compelling technology. In clouds, clients can dynamically allocate their resources on-demand without sophisticated deployment and management of resources. Key enabling technologies for clouds include the Map Reduce programming paradigm, distributed file systems, virtualization and so forth. These techniques emphasize scalability, so clouds can be large in scale, […]
The Sequence of Operations In Credit Card Transaction Processing
They proposed credit card fraud detection with a neural network. They have built detection system, which is trained on a large sample of labeled credit card account transactions. These transactions contain example fraud cases due to lost cards, stolen cards, application fraud, counterfeit fraud, mail-order fraud, and non received issue (NRI) fraud. suggest a credit […]
Learning with attributes as label embedding
The image classification problem: given an image, we wish to annotate it with one (or multiple) class label(s) describing its visual content. Image classification is a prediction task where the goal is to learn from labeled data a function : The maps an input x in the space of images to an output in the […]
Privacy Enhanced Participatory Sensing Infrastructure
The outbreak of Wireless Sensor Networks (WSNs) and predicted the widespread installation of sensors, in infrastructures, buildings, woods, rivers, or even the atmosphere. This has triggered a lot of interest in many different WSN topics, including identifying and addressing security issues, such as data integrity, node capture, secure routing, etc. On the contrary, privacy has […]
Trace Based Analysis On Mobile Social Networks (MSNETS)
The context of intermittently connected networks, DTNs, Pocket Switched Networks (PSNs), and Opportunistic Networks, a number of routing schemes have been proposed for data forwarding and content dissemination. These routing schemes exploit the fact that end-toend paths do exist over time in intermittently connected networks, which depend on a store-carry-and-forward pattern. Most recent work focuses […]
Local Versus Integrated Interface Schemas
Web information extraction and annotation has been an active research area in recent years. Many systems rely on human users to mark the desired information on sample pages and label the marked data at the same time, and then the system can induce a series of rules (wrapper) to extract the same set of information […]
Tree Patterns Used in Optimization Processes
A comprehensive survey about XML tree patterns, which are nowadays considered crucial in XML querying and its optimization. We first compare TPs from a structural point of view, concluding that the richer a TP is with matching possibilities, the larger the subset of XQuery/XPath it encompasses, and thus the closer to user expectations it is. […]
- « Previous Page
- 1
- …
- 38
- 39
- 40
- 41
- 42
- …
- 108
- Next Page »