Search reranking is regarded as a common way to boost retrieval precision. The problem nevertheless is not trivial especially when there are multiple features or modalities to be considered for search, which often happens in image and video retrieval. This paper proposes a new reranking algorithm , named circular reranking, that reinforces the mutual exchange of information across […]
Implementing Effective Controls in a Mobile, Agile, Cloud-Enabled Enterprise
security teams that call for security to be “everyone’s responsibility” and “built in, not bolted on” are struggling to protect their businesses in the face of consumerization, mobility, cloud, and agile business environments. This article offers tangible techniques to turn these clichés into reality while considering the cultural and trust barriers that hinder the implementation […]
Content Delivery Networks In Load Balancing For A Distributed Control Law
we face the challenging issue of defining and implementing an effective law for load balancing in Content Delivery Networks (CDNs). We base our proposal on a formal study of a CDN system, carried out through the exploitation of a fluid flow model characterization of the network of servers. Starting from such characterization, we derive and […]
Attribute-Based Encryption Using Cloud Computing In Scalable and Secure Sharing of Personal Health Records
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ […]
Multiattribute Resource Allocation Of Dynamic Optimization In Self-Organizing Clouds
By leveraging virtual machine (VM) technology which provides performance and fault isolation, cloud resources can be provisioned on demand in a fine grained, multiplexed manner rather than in monolithic pieces. By integrating volunteer computing into cloud architectures, we envision a gigantic self-organizing cloud (SOC) being formed to reap the huge potential of untapped commodity computing […]
Presence of Taxonomies In The Discovering Temporal Change Patterns
The steadfast evolution of markets and business environments prompts the need of data mining algorithms to discover significant correlation changes in order to reactively suit product and service provision to customer needs. Change mining, in the context of frequent itemsets, focuses on detecting and reporting significant changes in the set of mined itemsets from one […]
Wireless Sensor Networks Sleep-Wake Cycling In Relay Selection for Geographical Forwarding
We seek to develop local forwarding algorithms that can be tuned so as to tradeoff the end-to-end delay against a total cost, such as the hop count or total energy, Our work is motivated by geographical forwarding of sporadic alarm packets to a base station in a wireless sensor network (WSN), where the nodes are sleep-wake […]
Location Proof Updating System In A Resistance And Toward Privacy Preserving
we propose A Privacy-Preserving Location proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server For The Purpose […]
Social Network Data Anonymization In Protecting Sensitive Labels
Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. Recently, researchers have developed privacy models similar to k-anonymity to prevent node reidentification through structure information. However, even when these privacy models are enforced, an attacker may still be able to infer one’s private […]
Website Structure Improvement through Facilitating Effective User Navigation
A primary reason is that the web developers’ understanding of how a website should be structured can be considerably different from that of the users. While various methods have been proposed to relink webpages to improve navigability using user navigation data, the completely reorganized new structure can be highly unpredictable, and the cost of disorienting […]
- « Previous Page
- 1
- …
- 60
- 61
- 62
- 63
- 64
- …
- 108
- Next Page »