Showing 733–744 of 776 results

  • Transparent Real-Time Task Scheduling on Temporal Resource Partitions

    0 out of 5
    4,500

    Transparent Real-Time Task Scheduling on Temporal Resource Partitions Abstract? Transparent Real-Time Task Scheduling on Temporal Resource Partitions. The Hierarchical Real-Time Scheduling < Final Year Projects 2016 > technique helps improve overall resource utilization in real-time embedded systems. With HiRTS, a computation resource is divided into a group of temporal resource partitions, each of which accommodates…

  • Placeholder

    Trees Cannot Lie: Using Data Structures for Forensics Purposes

    0 out of 5
    4,500

    Trees Cannot Lie: Using Data Structures for Forensics Purposes Abstract? Trees Cannot Lie: Using Data Structures for Forensics Purposes. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=”…

  • Trinity on using trinary tree

    0 out of 5
    4,500

    Trinity on using trinary tree Abstract?Trinity on using trinary tree. Web data extractors are used to extract data from web documents in order to feed automated processes. In this article, we propose a technique that works on two or more web documents generated by the same server-side template and learns a regular expression that models…

  • Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction

    0 out of 5
    4,500

    Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction Abstract? Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction. Web data extractors are used to extract data from web documents in order to feed automated processes. In this article, we propose a technique that works on two or more web documents generated by…

  • TRIP: An Interactive Retrieving-Inferring Data Imputation Approach

    0 out of 5
    4,500

    TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? TRIP: An Interactive Retrieving-Inferring Data Imputation Approach. Data < Final Year Projects 2016 > aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing…

  • TRIP: An Interactive Retrieving-Inferring Data Imputation Approach

    0 out of 5
    4,500

    TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? : TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Data imputation aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing values from the complete…

  • Trust and Compactness in Social Network Groups

    0 out of 5
    4,500

    Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how < Final Year Projects 2016 > enjoy and share the platform contents, how they…

  • Trust-based Service Composition and Optimization

    0 out of 5
    4,500

    Trust-based Service Composition and Optimization Abstract? Trust-based Service Composition and Optimization. As an important method for creating value-added services by composing existing services, Web service composition technology has attracted an increasing attention in recent years. Most current service composition and optimization methods utilize quality of service (QoS) attributes to decide which concrete services to invoke….

  • Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm

    0 out of 5
    5,500

    Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm Abstract?Cloud computing is popularizing the computing paradigm in which data is outsourced to a third-party service provider (server) for data mining. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database…

  • Placeholder

    Trusted DB Data Privacy And Data Confidentiality

    0 out of 5
    4,500

    Trusted DB Data Privacy And Data Confidentiality Abstract?Trusted DB Data Privacy And Data Confidentiality, Traditionally, as soon as confidentiality becomes a concern, data are encrypted before outsourcing to a service provider. Any software-based cryptographic constructs then deployed, for server-side query processing on the encrypted data, inherently limit query expressiveness. Here, we introduce TrustedDB, an outsourced…

  • Placeholder

    Trustworthiness management in the social network of things

    0 out of 5
    4,500

    Trustworthiness management in the social network of things Abstract?Trustworthiness management in the social network of things. The integration of social networking concepts into the Internet of things has led to the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing social relationships in an autonomous way with respect to their…

  • Trustworthy Parking Communities: Helping Your Neighbor to Find a Space

    0 out of 5
    5,500

    Trustworthy Parking Communities: Helping Your Neighbor to Find a Spaces Abstract?Abstract Cooperation between vehicles facilitates traffic management, road safety and infotainment applications. Cooperation,however, requires trust in the validity of the received information. In this paper, we tackle the challenge of securely exchanging parking spot availability information. Trust is crucial in order to support the decision…

End of content

End of content