Showing 2161–2172 of 2258 results

  • Placeholder

    Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction

    0 out of 5
    4,500

    Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction Abstract? Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction. Web data extractors are used to extract data from web documents in order to feed automated processes. In this article, we propose a technique that works on two or more web documents generated by…

  • Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM

    0 out of 5
    4,500

    Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM Abstract? Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM. A trip-point bit-line precharge TBP sensing scheme is proposed for high-speed single-ended static random-access memory (SRAM). < Final Year Project 2016 > This TBP scheme mitigates the issues of limited performance, power, sensing margin, and area found in…

  • TRIP: An Interactive Retrieving-Inferring Data Imputation Approach

    0 out of 5
    4,500

    TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? TRIP: An Interactive Retrieving-Inferring Data Imputation Approach. Data < Final Year Projects 2016 > aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing…

  • TRIP: An Interactive Retrieving-Inferring Data Imputation Approach

    0 out of 5
    4,500

    TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? : TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Data imputation aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing values from the complete…

  • Placeholder

    Trust and Compactness in Social Network Groups

    0 out of 5
    4,500

    Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how they enjoy and share the platform contents, how they are driven by their preferences/tastes,…

  • Trust and Compactness in Social Network Groups

    0 out of 5
    4,500

    Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how < Final Year Projects 2016 > enjoy and share the platform contents, how they…

  • Placeholder

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

    0 out of 5
    4,500

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage.Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptographic…

  • Placeholder

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

    0 out of 5
    4,500

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage. Cloud data storage has provided signi?cant bene?ts by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud,…

  • Placeholder

    Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing

    0 out of 5
    4,500

    Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing Abstract? Cloud service certifications (CSC) attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt reliability of such certifications. We argue that continuous auditing (CA)…

  • Trust-based Service Composition and Optimization

    0 out of 5
    4,500

    Trust-based Service Composition and Optimization Abstract? Trust-based Service Composition and Optimization. As an important method for creating value-added services by composing existing services, Web service composition technology has attracted an increasing attention in recent years. Most current service composition and optimization methods utilize quality of service (QoS) attributes to decide which concrete services to invoke….

  • Placeholder

    Trusted DB Data Privacy And Data Confidentiality

    0 out of 5
    4,500

    Trusted DB Data Privacy And Data Confidentiality Abstract?Trusted DB Data Privacy And Data Confidentiality, Traditionally, as soon as confidentiality becomes a concern, data are encrypted before outsourcing to a service provider. Any software-based cryptographic constructs then deployed, for server-side query processing on the encrypted data, inherently limit query expressiveness. Here, we introduce TrustedDB, an outsourced…

  • Placeholder

    Trustworthiness management in the social network of things

    0 out of 5
    4,500

    Trustworthiness management in the social network of things Abstract?Trustworthiness management in the social network of things. The integration of social networking concepts into the Internet of things has led to the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing social relationships in an autonomous way with respect to their…

End of content

End of content