To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model Abstract? To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…
Top-k Similarity Join in Heterogeneous Information Networks Abstract? Top-k Similarity Join in Heterogeneous Information Networks. As a newly emerging network model, heterogeneous information networks < Final Year Projects 2016 > have received growing attention. Many data mining tasks have been explored in HINs, including clustering, classi?cation, and similarity search. Similarity join is a fundamental operation…
Topic Model for Graph Mining Abstract? Topic Model for Graph Mining. Graph mining has been a popular research area because of its numerous application scenarios. Many unstructured and structured data can be represented as graphs, such as, documents, chemical molecular structures, and images. However, an issue in relation to current research on graphs is that…
Topic-Sensitive Influencer Mining in Interest-Based Social Media Networks via Hypergraph Learning Abstract?Topic-Sensitive Influencer Mining in Interest-Based. Social Media Networks via Hypergraph Learning, Social media is emerging as a new mainstream means of interacting around online media. Social influence mining in social networks is therefore of critical importance in real-world applications such as friend suggestion and…
TopicSketch: Real-time Bursty Topic Detection from Twitter Abstract-Twitter has become one of the largest microblogging platforms for users around the world to share anything happening around them with friends and beyond. A bursty topic in Twitter is one that triggers a surge of relevant tweets within a short period of time, which often reflects important…
Toward Optimal Feature Selection in Naive Bayes for Text Categorization Abstract?Automated feature selection is important for text categorization to reduce the feature size and to speed up the learning process of classifiers. In this paper, we present a novel and efficient feature selection framework based on the Information Theory, which aims to rank the features…
Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data Abstract– Frequent itemset mining, which is the essential operation in association rule mining, is one of the most widely used data mining techniques on massive datasets nowadays. With the dramatic increase on the scale of datasets collected and stored with cloud services in recent years,…
Toward Privacy Preserving in IoT E-health Systems: A Key Escrow Identity-based Encryption Scheme Abstract-E-health represents one of the most promising Internet of Things (IoT) applications. Indeed, it enhances the traditional medical services by monitoring periodically patient?s health information. Due to the sensitivity of exchanged medical data, strong and efficient security and privacy protocols must be…
Toward SWSs Discovery: Mapping fromWSDL to OWL-S Based on OntologySearch and Standardization Engine Abstract? Semantic Web Services (SWSs) represent the most recent and revolutionary technology developed for machine-to-machine interaction on the web 3.0. As for the conventional web services, the problem of discovering and selecting the most suitable web service represents a challenge for SWSs…
Toward Trustworthy Coordination of Web Services Business Activities.We present a lightweight Byzantine fault tolerance (BFT) algorithm, which can be used to render the coordination of web services business activities (WS-BA) more trustworthy. The lightweight design of the BFT algorithm is the result of a comprehensive study of the threats to the WS-BA coordination services and…
Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud Platform Abstract? Ubiquitous healthcare services are becoming more and more popular, especially under the urgent demand of the global aging issue. Cloud computing owns the pervasive and on-demand service-oriented natures, which can fit the characteristics of healthcare services very well. However, the abilities in dealing…