Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud Abstract? Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud. Storage as a service has become an important paradigm in cloud computing for its great flexibility and economic savings. However, the development is hampered by data privacy concerns: data owners no longer physically possess…
Towards Privacy-preserving and Practical Image-centric Social Discovery Abstract? Images are becoming one of the key enablers of user connectivity in social media applications. Many of them are directly exploring image content to suggest new friends with similar interests. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete…
Towards Secure Data Distribution Systems in Mobile Cloud Computing Abstract– In the first place, cloud computing is though the electronic technologies have undergone fast developments in recent years, mobile devices such as smartphones are still comparatively weak in contrast to desktops in terms of computational capability, storage etc, and are not able to meet the…
Towards the Scheduling of Access Requests In Cloud Storage Abstract?In recent years, cloud computing has emerged as an enabling technology, in which virtual machine migration and dynamic resource allocation is one of the hot issues. During the migration of virtual machine, access requests from end users coming constantly. So how to schedule these requests to…
Towards Trustworthy Resource Scheduling in Clouds Abstract? Towards Trustworthy Resource Scheduling in Clouds. Managing the allocation of cloud virtual machines at physical resources is a key requirement for the success of clouds. Current implementations of cloud schedulers do not consider the entire cloud infrastructure neither do they consider the overall user and infrastructure properties….
Traffic Engineering in Software Defined Networks Abstract?Software Defined Networking is a new networking paradigm that separates the network control plane from the packet forwarding plane and provides applications with an abstracted centralized view of the distributed network state. A logically centralized controller that has a global network view is responsible for all the control decisions…
Transparently Exploiting Device-Reserved Memory for Application Performance in Mobile System Abstract? Most embedded systems require contiguous memory space to be reserved for devices, which may lead to memory under-utilization. Although several approaches have been proposed to address this issue, they have limitations of either inefficient memory usage or long latency for switching the reserved memory…
Trinity on using trinary tree Abstract?Trinity on using trinary tree. Web data extractors are used to extract data from web documents in order to feed automated processes. In this article, we propose a technique that works on two or more web documents generated by the same server-side template and learns a regular expression that models…
Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction Abstract? Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction. Web data extractors are used to extract data from web documents in order to feed automated processes. In this article, we propose a technique that works on two or more web documents generated by…
TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? TRIP: An Interactive Retrieving-Inferring Data Imputation Approach. Data < Final Year Projects 2016 > aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing…
Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing Abstract? Cloud service certifications (CSC) attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt reliability of such certifications. We argue that continuous auditing (CA)…