The problems that arise in OSNs, and proposed a diverse range of “privacy solutions”. These include software tools and design principles to address OSN privacy issues. Each of these solutions is developed with a specific type of user, use, and privacy problem in mind. This has had some positive effects: we now have a broad […]
CPDP Publicly Verifiable Information To Prove A Structure
Many trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology. Consider the large size of the outsourced electronic data and the client’s constrained resource capability, the core of the problem can be generalized as how can the client find an efficient way to perform periodical […]
Multiple-input-multiple-output (MIMO) wireless systems
Increasing demand for high-speed wireless networks has motivated the development of wireless ad-hoc networks. In order to fully exploit the technological development in radio hardware and integrated circuits, which allow for implementation of more complicated communication schemes, the fundamental performance limits of wireless networks should be reevaluated. In this context, the distinct characteristics of wireless […]
The Method is applied to correction of spelling errors in queries Reformulation
This paper addresses string transformation, which is an essential problem, in many applications. In natural language processing, pronunciation generation, spelling error correction, word transliteration, and word stemming can all be formalized as string transformation. String transformation can also be used in query reformulation and query suggestion in search. In data mining, string transformation can be […]
Collaboration Framework for Multi Cloud Systems
The term cloud computing can be defined as “a system that is concerned with the integration, virtualization, standardization, and management of services and resources”. The benefits of cloud computing include minimized capital expenditure, utilization and efficiency improvement, high computing power, location and device independence and finally very high scalability . Cloud computing brings a scenario […]
Two server password only Authentication and key exchange
Nowdays, passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines and so on. A computer user may require passwords for many purposes: logging in to computer accounts, retrieving e-mail from servers, accessing programs, databases, networks, web sites, […]
The Basis Of Information Entropy
The current state of the art of privacy-preserving techniques in participatory sensing. The first implementation of a privacy aware architecture, named Anony Sense, for the anonymous task allocation and data reporting. From the perspective of cryptography, analyzed the realistic architectural assumptions and privacy requirements, and then provided an instantiation that achieved privacy protection in participatory […]
Trust information is dependent to the Structure of p2p network
A trust model for P2P networks is presented, in which a peer can develop a trust network in its proximity. A peer can isolate malicious peers around itself as it develops trust relationships with good peers. Two context of trust, service and recommendation contexts, are defined to measure capabilities of peers in providing services and […]
Collaboration framework For Multicloud systems
The recent surge in cloud computing arises from its ability to provide software, infrastructure, and platform services without requiring large investments or expenses to manage and operate them. Clouds typically involve service providers, infrastructure/resource providers, and service users (or clients). They include applications delivered as services, as well as the hardware and software systems providing […]
Inferring user search goals by Clustering Pseudo Documents
A novel approach has been proposed to infer user search goals for a query by clustering its feedback sessions represented by pseudo-documents. The introduce feedback sessions to be analyzed to infer user search goals rather than search results or clicked URLs. Both the clicked URLs and the un clicked ones before the last click are […]
- « Previous Page
- 1
- …
- 39
- 40
- 41
- 42
- 43
- …
- 108
- Next Page »