Showing 1837–1848 of 1911 results

  • Placeholder

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

    0 out of 5
    4,500

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage.Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptographic…

  • Placeholder

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

    0 out of 5
    4,500

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage. Cloud data storage has provided signi?cant bene?ts by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud,…

  • Placeholder

    Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing

    0 out of 5
    4,500

    Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing Abstract? Cloud service certifications (CSC) attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt reliability of such certifications. We argue that continuous auditing (CA)…

  • Trust-based Service Composition and Optimization

    0 out of 5
    4,500

    Trust-based Service Composition and Optimization Abstract? Trust-based Service Composition and Optimization. As an important method for creating value-added services by composing existing services, Web service composition technology has attracted an increasing attention in recent years. Most current service composition and optimization methods utilize quality of service (QoS) attributes to decide which concrete services to invoke….

  • Placeholder

    Trusted DB Data Privacy And Data Confidentiality

    0 out of 5
    4,500

    Trusted DB Data Privacy And Data Confidentiality Abstract?Trusted DB Data Privacy And Data Confidentiality, Traditionally, as soon as confidentiality becomes a concern, data are encrypted before outsourcing to a service provider. Any software-based cryptographic constructs then deployed, for server-side query processing on the encrypted data, inherently limit query expressiveness. Here, we introduce TrustedDB, an outsourced…

  • Placeholder

    Trustworthiness management in the social network of things

    0 out of 5
    4,500

    Trustworthiness management in the social network of things Abstract?Trustworthiness management in the social network of things. The integration of social networking concepts into the Internet of things has led to the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing social relationships in an autonomous way with respect to their…

  • Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

    0 out of 5
    4,500

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds. A major challenging problem for cloud providers is designing ef?cient mechanisms for virtual machine < Final Year Projects 2016 > VM provisioning and allocation. Such mechanisms enable the cloud providers…

  • Placeholder

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

    0 out of 5
    4,500

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? A major challenging problem for cloud providers is designing efficient mechanisms for virtual machine (VM) provisioning and allocation. Such mechanisms enable the cloud providers to effectively utilize their available resources and obtain higher profits. Recently, cloud providers have introduced auction-based models for…

  • TruXy: Trusted Storage Cloud for Scientific Workflows

    0 out of 5
    4,500

    TruXy: Trusted Storage Cloud for Scientific Workflows Abstract? TruXy: Trusted Storage Cloud for Scientific Workflows. A wide array of Clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as < Final Year Projects 2016 > Taverna and Galaxy to model the execution of…

  • Placeholder

    Twitter data analysis by means of Strong FlippingGeneralized Itemsets

    0 out of 5
    4,500

    Twitter data analysis by means of Strong FlippingGeneralized Itemsets Abstract?Social Network Services (SNS) like Facebook, Twitter, Sina Weibo etc. are widely used all over the world today. People use them to keep in touch with friends and make new friends online. In China, Sina Weibo is one of the most successful social network service and…

  • Placeholder

    Two cooperative ant colonies for feature selection using fuzzy models

    0 out of 5
    4,500

    Two cooperative ant colonies for feature selection using fuzzy models Abstract? The available set of potential features in real-world databases is sometimes very large,< Final Year Projects > and it can be necessary to find a small subset for classification purposes. One of the most important techniques in data pre-processing for classification is feature selection….

  • Typicality-Based Collaborative Filtering Recommendation

    0 out of 5
    4,500

    Typicality-Based Collaborative Filtering Recommendation Abstract? Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. We borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A…

End of content

End of content