Showing 1105–1116 of 1348 results

  • Scalable Algorithms for Nearest-Neighbor Joins on Big Trajectory Data

    0 out of 5
    5,500

    Scalable Algorithms for Nearest-Neighbor Joins on Big Trajectory Data Abstract? Trajectory data are prevalent in systems that monitor the locations of moving objects. In a location-based service, for instance, the positions of vehicles are continuously monitored through GPS; the trajectory of each vehicle describes its movement history.We study joins on two sets of trajectories, generated…

  • Scalable Analytics for IaaS Cloud Availability

    0 out of 5
    4,500

    Scalable Analytics for IaaS Cloud Availability Abstract?Scalable Analytics for IaaS Cloud Availability. In a large Infrastructure-as-a-Service (IaaS) cloud, component failures are quite common. Such failures may lead to occasional system downtime and eventual violation of Service Level Agreements (SLAs) on the cloud service availability. The availability analysis of the underlying infrastructure is useful to the…

  • Scalable Daily Human Behavioral Pattern Mining from Multivariate Temporal Data

    0 out of 5
    5,500

    Scalable Daily Human Behavioral Pattern Mining from Multivariate Temporal Data Abstract? This work introduces a set of scalable algorithms to identify patterns of human daily behaviors. These patterns are extracted from multivariate temporal data that have been collected from smartphones. We have exploited sensors that are available on these devices, and have identified frequent behavioral…

  • Scalable Distributed Processing of K Nearest Neighbor Queries over Moving Objects

    0 out of 5
    4,500

    Scalable Distributed Processing of K Nearest Neighbor Queries over Moving Objects Abstract? Scalable Distributed Processing of K Nearest Neighbor Queries over Moving Objects. Central to many applications involving moving objects is the task of processing k-nearest neighbor (k-NN) queries. Most of the existing approaches to this problem are designed for the centralized setting where query…

  • Scalable secure sharing Personal Health Record in cloud(JSP)

    0 out of 5
    4,500

    Scalable secure sharing Personal Health Record in cloud(JSP)   Abstract?Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is often outsourced to be stored in a third-party server. In this paper we propose a novel secure and scalable system for sharing PHRs. We focus…

  • Scalable secure sharing Personal Health Record using Attribute Based Encryption

    0 out of 5
    4,500

    Scalable secure sharing Personal Health Record using Attribute Based Encryption Abstract? Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those…

  • Search Rank Fraud and Malware Detection in Google Play

    0 out of 5
    4,500

    Search Rank Fraud and Malware Detection in Google Play Abstract-Fraudulent behaviors in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has focused on app executable and permission analysis. In this paper, we introduce FairPlay, a novel system that discovers and leverages traces left…

  • Searchable Encryption over Feature-Rich Data

    0 out of 5
    5,500

    Searchable Encryption over Feature-Rich Data Abstract?Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File…

  • SecRBAC: Secure data in the Clouds

    0 out of 5
    5,500

    SecRBAC: Secure data in the Clouds Abstract?Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of control over their data and raises reasonable security concerns that slow down the adoption…

  • Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

    0 out of 5
    4,500

    Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks Abstract? Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks. A data discovery and dissemination protocol for wireless sensor networks < Final Year Projects 2016 > is responsible for updating con?guration parameters of, and distributing management commands to, the sensor nodes. All…

  • Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

    0 out of 5
    4,500

    Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage Abstract-Cloud storage facilitates both individuals and enterprises to cost effectively share their data over the Internet.However,this also brings difficult challenges to the access control of shared data since few cloud servers can be fully trusted. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach that enables…

  • Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

    0 out of 5
    4,500

    Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Abstract?Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks. Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission…

End of content

End of content