This paper extends the line of enquiry in SPI research to address process improvement in distributed product development teams. We develop key process areas (KPAs) that specifically address the fundamental characteristics of distributed work identified in ‘collaboration readiness’, ‘technology readiness’, ‘common ground’, and ‘coupling in work’. By explicating the five-year SPI journey of a large […]
Privacy Preserving Authenticated Access Control Scheme
This paper proposes privacy preserving authenticated access control scheme. In this scheme to scheme a user can create a file and store it securely in the cloud. This scheme consists of use of the two protocols Attribute Base Encryption (ABE) and Attribute Based Signature (ABS). Distributed access control of data stored in cloud so that […]
Mis-sequencing problem: Three Stage load-balancing switch
In this paper, we introduced a three-stage load-balancing switch and studied its performance via theoretical analysis and experimental simulation. This effectively solves the mis-sequencing problem without the need of costly online scheduling algorithms or hardware speedup. The most significant difference between the 3SLB switch and prior load-balancing switches is the third stage of the 3SLB […]
iTRUST Scheme For Misbehavior Detection In DTNs
In this paper, we propose iTrust, a probabilistic misbehavior detection scheme to achieve efficient trust establishment in DTNs. we propose a general misbehavior detection framework based on a series of newly introduced data forwarding evidences. The proposed evidence framework could not only detect various misbehaviors but also be compatible to various routing protocols. We introduce […]
Improving System throughput in CSMA protocols
In this paper, we consider random access protocols with MPR, where there is an access point (AP) and multiple nodes in a wireless network. The AP has an M MPRcapability. The study includes both the slotted-Aloha and the -persistent CSMA protocols. For both protocols, each node makes a transmission attempt with a given probability in […]
QOD Routing Protocols for hybrid Networks
In this paper, we propose a QoS-Oriented Distributed routing protocol (QOD). Usually, a hybrid network has widespread base stations. The data transmission in hybrid networks has two features. First, an AP can be a source or a destination to any mobile node. Second, the number of transmission hops between a mobile node and an AP […]
PRIVACY IN DATA PUBLICATION OF SOCIAL NETWORKS
The first necessary anonymization technique in both the contexts of micro- and network data consists in removing identification. This nave technique has quickly been recognized as failing to protect privacy. For microdata, Sweeney et al. propose k-anonymity to circumvent possible identity disclosure in naively anonymized microdata. `-diversity is proposed in order to further prevent attribute […]
THE L SENSITIVE LABEL DIVERSITY REQUIREMENT
The publication of social network data entails a privacy threat for their users. Sensitive information about users of the social networks should be protected. The challenge is to devise methods to publish social network data in a form that affords utility without compromising privacy. Previous research has pro- posed various privacy models with the corresponding […]
A secure multiparty protocol for computing the OR of private binary vectors
The problem of secure mining of association rules in horizontally partitioned databases. In that setting, there are several sites (or players) that hold homogeneous databases, i.e., databases that share the same schema but hold information on different entities. The goal is to find all association rules with support at least s and confidence at least […]
A SCALABLE SENTENCE SCORING METHOD
Ranking has abundant applications in information retrieval (IR), data mining, and natural language processing. In many real scenarios, the ranking problem is defined as follows. Given a group of data objects, a ranking model (function) sorts the objects in the group according to their degrees of relevance, importance, or preferences. For example, in IR, the […]
- « Previous Page
- 1
- …
- 10
- 11
- 12
- 13
- 14
- 15
- Next Page »