In this abstract propose a two-time-scale control algorithm aimed at reducing power cost and facilitating a power cost versus delay trade-off in geographically distributed data centers. By extending the traditional Lyapunov optimization approach, which operates on a single time scale, to two different time scales, we derive analytical bounds on the time average power cost […]
ALG-DEDUPE FOR CLOUD BACKUP SERVICES OF PERSONAL STORAGE
In this abstract, we propose ALG-Dedupe, an Application-aware Local-Global source deduplication scheme that not only exploits application awareness, but also combines local and global duplication detection, to achieve high deduplication efficiency by reducing the deduplication latency to as low as the application-aware loc al de-duplication while saving as much cloud storage cost as the application-aware […]
SPARSE REPRESENTATION BASED FINGERPRINT COMPRESSION
Large volumes of fingerprint are collected and stored every day in a wide range of applications, including forensics and access control. Due to the large number and size of fingerprint images, data compression has to be applied to reduce the storage and communication bandwidth requirements of those images. Obtaining an over complete dictionary from a […]
A NOVEL PUBLIC AUDITING MECHANISM FOR THE INTEGRITY OF SHARED DATA WITH EFFICIENT USER REVOCATION IN THE CLOUD
In this abstract, we propose Panda, a novel public auditing mechanism for the integrity of shared data with efficient user revocation in t he cloud. In our mechanism, by utilizing the idea of proxy re-signatures, once a user in the group is revoked, the cloud is able to re-sign the blocks, which were signed by […]
A NOVEL FINGERPRINT COMPRESSION ALGORITHM BASED ON SPARSE REPRESENTATION
A new compression algorithm adapted to fingerprint images is introduced. Despite the simplicity of our proposed algorithms, they compare favorably with existing more sophisticated algorithms, especially at high compression ratios. Due to the block-by-block processing mechanism, however, the algorithm has higher complexities. The proposed method has the ability by updating the dictionary. The specific process […]
EFFECTIVE AND EFFICIENT BORDA COUNT APPROACH USING INDEX BASED ALGORITHM FOR TOP-K QUERY ON MULTIVALUED OBJECTS
As ranking is an essential analytic method, it is natural and fundamental to investigate how to rank a set of multivalued objects. To the best of our knowledge, however, there is no existing work addressing this important problem systematically. One may think we may simply rank multivalued objects as uncertain/probabilistic data. However, the models of […]
A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING PROTOCOL FOR THE LOCAWARD SYSTEM
In this abstract, we propose a secure, privacy-preserving, and realistic mobile location-based rewarding system, called LocaWard, which strives to address the above concerns. The proposed system consists of a trusted third party (TTP), mobile users (MUs), token distributors (TDs), token collectors (TCs), and a central controller (CC). The TTP issues each MU with a real […]
SECURE AUTHORIZED DEDUPLICATION USING A HYBRID CLOUD APPROACH
Data deduplication is a specialized data compression technique for eliminating duplicate copies of repeating data in storage. The technique is used to improve storage utilization and can also be applied to network data transfers to reduce the number of bytes that must be sent. To protect the confidentiality of sensitive data while supporting deduplication, the […]
DOS ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
DoS attacks severely degrade the availability of a victim, which can be a host, a router, or an entire network. They impose intensive computati on tasks to the victim by exploiting its system vulnerability or flooding it with huge amount of useless packets. The victim can be forced out of service from a few minutes […]
PREDICTING THE DEGREE OF THE DIFFICULTY FOR KEYWORD QUERIES OVER DATABASES
In Keyword Query Interface, any entity in a data set that contains the query keywords is a potential answer, keyword queries typically have many possible answers. KQIs must identify the information needs behind keyword queries and rank the answers so that the desired answers appear at the top of the list. In this abstract, we […]
- « Previous Page
- 1
- …
- 9
- 10
- 11
- 12
- 13
- …
- 17
- Next Page »