Showing 1–12 of 1347 results

  • Placeholder

    ?Scalable continual top-k keyword search in relational databases

    0 out of 5
    4,500

    ?Scalable continual top-k keyword search in relational databases Abstract? Scalable continual top-k keyword search in relational databases. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ]…

  • Placeholder

    ?TACI: Taxonomy-Aware Catalog Integration

    0 out of 5
    4,500

    ?TACI: Taxonomy-Aware Catalog Integration Abstract? TACI: Taxonomy-Aware Catalog Integration.A fundamental data integration task faced by online commercial portals and commerce search engines is the integration of products coming from multiple providers to their product catalogs. In this scenario, the commercial portal has its own taxonomy (the ?master taxonomy?), while each data provider organizes its products…

  • 1 Stochastic Resource Provisioning for Container ized Multi-Tier Web Ser vices in Clouds

    0 out of 5
    4,500

    1 Stochastic Resource Provisioning for Container ized Multi-Tier Web Ser vices in Clouds Abstract-Under today?s bursty web traffic, the fine-grained per-container control promises more efficient resource provisioning for web services and better resource utilization in cloud datacenters. It optimizes resource provisioning for containerized n-tier web services in accordance with fluctuations of incoming workload to accommodate…

  • Placeholder

    A CBR-based Approach to ITIL-based Service Desk

    0 out of 5
    4,500

    A CBR-based Approach to ITIL-based Service Desk Abstract?During the last 20 years ITIL (IT Infrastructure Library) has been evolving with the latest version published in 2007. Incident Management and Problem Management are two main activities of ITIL service operation framework which handles incidents and their root causes respectively. Service Desk systems are software tools that…

  • Placeholder

    A Cloud Computing Based Telemedicine Service

    0 out of 5
    4,500

    A Cloud Computing Based Telemedicine Service Abstract?Health is the greatest possession?. Various techniques are drawn for the better treatment of health of society. As the technology is reaching its peak, it is emerging in medical treatments quickly and fruitfully giving birth to ?telemedicine? – invention of technology in medicine. Earlier slow and erroneous processes are…

  • A Cocktail Approach for Travel Package Recommendation

    0 out of 5
    4,500

    A Cocktail Approach for Travel Package Recommendation Abstract? Recent years have witnessed an increased interest in recommender systems. Despite significant progress in this field, there still remain numerous avenues to explore. Indeed, this paper provides a study of exploiting online travel information for personalized travel package recommendation. A critical challenge along this line is to…

  • A Cold Start Recommendation System Using Item Correlation and User Similarity

    0 out of 5
    4,500

    A Cold Start Recommendation System Using Item Correlation and User Similarity Abstract? Conventional recommendation systems tend to focus on variations of well-known information retrieval techniques. We took a fresh approach, rather than to follow the traditional, commonly applied recommendation methodology of creating a user-item matrix, and then using them to make recommendations. Instead, we established…

  • A Collaborative DDoS Defence Framework using Network Function Virtualization

    0 out of 5
    4,500

    A Collaborative DDoS Defence Framework using Network Function Virtualization Abstract-High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one of the top security concerns as the DDoS attacks volumes are increasing constantly. Among them the SYN Flood attack is the most common type. Conventional DDoS defense solutions may not bepreferable since…

  • A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

    0 out of 5
    4,500

    A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing Abstract– Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback in urgent need of solution is…

  • Placeholder

    A Comber Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS attack

    0 out of 5
    4,500

    A Comber Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS attack Abstract?Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to its…

  • A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem

    0 out of 5
    4,500

    A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem Abstract? A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem. Better understanding of structural class of a given protein reveals important information about its overall folding type and…

  • A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing

    0 out of 5
    5,500

    A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing Abstract? In hybrid cloud computing, cloud users have the ability to procure resources from multiple cloud vendors, and furthermore also the option of selecting different combinations of resources. The problem of procuring a single resource from one of many cloud vendors can be modeled…

End of content

End of content