Showing 1033–1044 of 1075 results

  • Placeholder

    Trusted DB Data Privacy And Data Confidentiality

    0 out of 5
    4,500

    Trusted DB Data Privacy And Data Confidentiality Abstract?Trusted DB Data Privacy And Data Confidentiality, Traditionally, as soon as confidentiality becomes a concern, data are encrypted before outsourcing to a service provider. Any software-based cryptographic constructs then deployed, for server-side query processing on the encrypted data, inherently limit query expressiveness. Here, we introduce TrustedDB, an outsourced…

  • Placeholder

    Trustworthiness management in the social network of things

    0 out of 5
    4,500

    Trustworthiness management in the social network of things Abstract?Trustworthiness management in the social network of things. The integration of social networking concepts into the Internet of things has led to the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing social relationships in an autonomous way with respect to their…

  • Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

    0 out of 5
    4,500

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds. A major challenging problem for cloud providers is designing ef?cient mechanisms for virtual machine < Final Year Projects 2016 > VM provisioning and allocation. Such mechanisms enable the cloud providers…

  • Placeholder

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

    0 out of 5
    4,500

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? A major challenging problem for cloud providers is designing efficient mechanisms for virtual machine (VM) provisioning and allocation. Such mechanisms enable the cloud providers to effectively utilize their available resources and obtain higher profits. Recently, cloud providers have introduced auction-based models for…

  • TruXy: Trusted Storage Cloud for Scientific Workflows

    0 out of 5
    4,500

    TruXy: Trusted Storage Cloud for Scientific Workflows Abstract? TruXy: Trusted Storage Cloud for Scientific Workflows. A wide array of Clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as < Final Year Projects 2016 > Taverna and Galaxy to model the execution of…

  • Placeholder

    Twitter data analysis by means of Strong FlippingGeneralized Itemsets

    0 out of 5
    4,500

    Twitter data analysis by means of Strong FlippingGeneralized Itemsets Abstract?Social Network Services (SNS) like Facebook, Twitter, Sina Weibo etc. are widely used all over the world today. People use them to keep in touch with friends and make new friends online. In China, Sina Weibo is one of the most successful social network service and…

  • Typicality-Based Collaborative Filtering Recommendation

    0 out of 5
    4,500

    Typicality-Based Collaborative Filtering Recommendation Abstract? Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. We borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A…

  • Placeholder

    Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services

    0 out of 5
    4,500

    Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services Abstract?Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services.The rapid development of Internet of things (IoT) technology makes it possible for connecting various smart objects together through the Internet and providing more data interoperability methods for application purpose. Recent research…

  • Ultralow-Voltage High-Speed Flash ADC Design Strategy Based on FoM-Delay Product

    0 out of 5
    4,500

    Ultralow-Voltage High-Speed Flash ADC Design Strategy Based on FoM-Delay Product Abstract? The ultralow-voltage (ULV) design strategy for high-speed flash analog-to-digital converters (ADCs). A lower supply voltage decreases the energy consumption at the cost of conversion speed. A new index, the figure-of-merit (FoM)-delay (FD) product, is introduced to provide a balance between the energy efficiency and…

  • Unified VLSI architecture for photo core transform used in JPEG XR

    0 out of 5
    4,500

    Unified VLSI architecture for photo core transform used in JPEG XR Abstract? In JPEG XR image compression technique the unified photo core transform is used. It is designed to support high dynamic range and high definition formats thus this type of JPEG XR image compression with unified photo core transform is widely used in real…

  • UNION: A Unified Inter/Intrachip Optical Network for Chip Multiprocessors

    0 out of 5
    4,500

    UNION: A Unified Inter/Intrachip Optical Network for Chip Multiprocessors Abstract?As modern computing systems become increasingly complex, communication efficiency among and inside chips has become as important as the computation speeds of individual processing cores. Traditionally, to maximize design flexibility, interchip and intrachip communication architectures are separately designed under different constraints. Jointly designing communication architectures for…

  • Universal Network Coding-Based Opportunistic Routing for Unicast

    0 out of 5
    4,500

    Universal Network Coding-Based Opportunistic Routing for Unicast Abstract?Universal Network Coding-Based Opportunistic Routing for Unicast. Network coding-based opportunistic routing has emerged as an elegant way to optimize the capacity of lossy wireless multihop networks by reducing the amount of required feedback messages. Most of the works on network coding-based opportunistic routing in the literature assume that…

End of content

End of content