The aim of choosing a subset of good features with respect to the target concepts, feature subset selection is an effective way for reducing dimensionality, removing irrelevant data, increasing learning accuracy, and improving result comprehensibility. Many feature subset selection methods have been proposed and studied for machine learning applications. They can be divided into four […]
Supervised Comparative Mining Method
Comparing alternative options is one essential step in decision-making that we carry out everyday. If someone is interested in certain products such as digital cameras, he or she would want to know what the alternatives are and compare different cameras before making a purchase. This type of comparison activity is very common in our daily […]
CloudMoV :A generic and portable mobile social TV framework
The revolutionary “reinventing the phone” campaigns initiated by Apple. Smartphones nowadays are shipped with multiple microprocessor cores and gigabyte RAMs; they possess more computation power than personal computers of a few years ago. On the other hand, the wide deployment of 3G broadband cellular infrastructures further fuels the trend. Apart from common productivity tasks like […]
OSNs provide and prevent unwanted messages on user walls
On-line Social Networks (OSNs) are today one of the most popular interactive medium to communicate, share and disseminate a considerable amount of human life information. Daily and continuous communications imply the exchange of several types of content, including free text, image, audio and video data. Facebook statistics1 average user creates 90 pieces of content each […]
Framework : Social Scalabele Adaptive Video Streaming in Mobile network Computing
The past decade, increasingly more traffic is accounted by video streaming and downloading. In video streaming services over mobile networks have become prevalent over the past few years. The video streaming is not so challenging in wired networks, mobile networks have been suffering from video traffic transmissions over scarce bandwidth of wireless links. Despite network […]
Mobile presence services for large-scale social network services
The ubiquity of the Internet, mobile devices and cloud computing environments can provide presence-enabled applications, social network applications/services, worldwide. Facebook, Twitter, Foursquare, Google Latitude, buddy cloud and Mobile Instant Messaging (MIM), are examples of presence-enabled applications that have grown rapidly in the last decade. Social network services are changing the ways in which participants engage […]
Amazon’s Cloud Formation upcoming the meta cloud for TOSCA specification
The cloud computing paradigm has achieved widespread adoption in recent years. Its success is due largely to customers’ ability to use services on demand with a pay-as-you go pricing model, which has proved convenient in many respects. Low costs and high flexibility make migrating to the cloud compelling. Despite its obvious advantages, however, many companies […]
Tweets Monitored to detect a target event of social sensor in location estimation
Twitter, a popular microblogging service, has received much attention recently. This online social network is used by millions of people around the world to remain socially connected to their friends, family members, and coworkers through their computers and mobile phones. Twitter asks one question, “What’s happening?” Answers must be fewer than 140 characters. A status […]
A cloud-based driving directions service in time-dependent landmark graph
A daily activity and been implemented as a key feature in many map services like Google and Bing Maps. A fast driving route saves not only the time of a driver but also energy consumption. This service is important for both end users and governments aiming to ease traffic problems and protect environment. The time […]
Idealized security requirements: impersonation, collusion, and privacy breaching
The conventional model of social networks, users select their contacts from a set of off-line acquaintances. Despite their utility, these conventional networks support only a subset of social networking: two users will only be able to establish a relationship in the social network if they , or are introduced to each other. One more Encounter […]
- « Previous Page
- 1
- …
- 47
- 48
- 49
- 50
- 51
- …
- 108
- Next Page »