cloudcomputing facilitates convenient and on-demand network access to a centralized pool of ***,many users prefer to outsource data to the cloud in order to mitigate the burden of local ***,storing sensitive data on ...
详细信息
cloudcomputing facilitates convenient and on-demand network access to a centralized pool of ***,many users prefer to outsource data to the cloud in order to mitigate the burden of local ***,storing sensitive data on remote servers poses privacy challenges and is currently a source of ***(Searchable Encryption)is a positive way to protect users sensitive data,while preserving search ability on the server *** allows the server to search encrypted data without leaking information in plaintext *** two main branches of SE are SSE(Searchable Symmetric Encryption)and PEKS(Public key Encryption with Keyword Search).SSE allows only private key holders to produce ciphertexts and to create trapdoors for search,whereas PEKS enables a number of users who know the public key to produce ciphertexts but allows only the private key holder to create *** article surveys the two main techniques of SE:SSE and *** SE schemes are categorized and compared in terms of functionality,efficiency,and ***,we point out some valuable directions for future work on SE schemes.
Due to increasing power consumption and cost, datacenter energy conservation has become increasingly important. As a result, a number of algorithms for optimizing compute, storage, and networking have been devised. H...
详细信息
Sentiment analysis has emerged as one of the prominent research branches because of its endless usages and applications. Monitoring social media, forums, blogs and other online resources for customer reviews, product ...
Sentiment analysis has emerged as one of the prominent research branches because of its endless usages and applications. Monitoring social media, forums, blogs and other online resources for customer reviews, product competition and survey responses to understand customer insight is of significant importance in business analytics. With the proliferation of informal user generated data online, the use of mixed language has become a common phenomenon. Mixed language arises through the use of linguistic code switching (LCS) or the practice of using more than one language in a single sentence. Such mixed language has rarely been a subject of sentiment analysis before. The lack of a clear grammatical structure renders the previous approaches to sentiment analysis ineffective for such text. In this paper, we propose a strategy to determine the sentiment of sentences written in a mixed language comprising of Hindi and English lexicons. Our technique can be used to analyze the sentiment of data belonging to any one of the source languages as well as the mixed language data. Grammatical transitions which are very common in mixed language have been taken into account during the sentiment analysis. We demonstrate the effectiveness of the proposed approach via case studies on social media data sets.
The location of a mobile user is used to deliver context sensitive information like advertisements and deals. Predicting the future possible locations of a mobile user can help target specific services. Nokia provided...
详细信息
ISBN:
(纸本)9781479987931
The location of a mobile user is used to deliver context sensitive information like advertisements and deals. Predicting the future possible locations of a mobile user can help target specific services. Nokia provided researchers with data collected from around 200 mobile users over a period of about 2 years for the purpose of research. Previous efforts have attempted either to predict the location of the user or the semantics associated with a location. In our work, we demonstrate that using a multi-level approach by predicting the semantics of a location and then the specific location within helps improve the accuracy of the prediction. We have shown that for certain semantic locations, the prediction accuracy can be as high as 90%.
Due to increasing power consumption and cost, datacenter energy conservation has become increasingly important. As a result, a number of algorithms for optimizing compute, storage, and networking have been devised. H...
详细信息
Due to increasing power consumption and cost, datacenter energy conservation has become increasingly important. As a result, a number of algorithms for optimizing compute, storage, and networking have been devised. However, these algorithms focus on job distribution based upon optimizing energy efficiency, and do not take availability into consideration. For example, if there are 3 servers, allocating workloads based only upon energy efficiency may result in consolidation of the workload into only 1 server, resulting in a single point of failure. This paper outlines the importance of availability and designs a hill climbing algorithm to prevent failure zone failure and hence also reduce the energy consumption by the datacenter.
cloudcomputing is still an emerging field experiencing rapid advancement in both industry and academia. cloudcomputing has solved many problems initially faced by internet application developers such as acquisition ...
详细信息
cloudcomputing is still an emerging field experiencing rapid advancement in both industry and academia. cloudcomputing has solved many problems initially faced by internet application developers such as acquisition of a server with a fixed capacity to handle expected peak application demand which led to under-utilization of provisioned resources, by enabling a new consumption and delivery model for IT services. It involves provisioning of dynamically scalable and virtualized resources as a service over the Internet. Evaluation of algorithms and policies in an exhaustive manner directly on a cloud is infeasible as it involves a lot of time and effort. Moreover, utilization of real cloud infrastructure limits the experiment to the scale of the infrastructure. A desirable alternative would be utilization of simulation tools that enables evaluation of a hypothesis in a repeatable, controlled and timely manner prior to software development in a cloud environment. Taking into consideration these issues and the ever-growing popularity of OpenStack, in this paper we propose OpenSim a simulator of OpenStack services. It has been developed by the authors of this paper with the intention of simulating new algorithms and also to enable a user to study the behavior of an application running under various deployment configuration in an OpenStack environment.
Hybrid clouds are increasingly becoming important in cloudcomputing. We see a rapid raise in the demand for a secure infrastructure that would enable sharing of computing resources between multiple hybrid cloud deplo...
详细信息
The healthy development of the Internet largely depends on the online advertisement which provides the financial support to the Internet. Click fraud, however, poses serious threat to the Internet ecosystem. It not on...
详细信息
The healthy development of the Internet largely depends on the online advertisement which provides the financial support to the Internet. Click fraud, however, poses serious threat to the Internet ecosystem. It not only brings harm to the advertisers, but also damages the mutual trust between advertiser and ad agency. Click fraud prediction is a typical bigdata application in that we normally need to identify the malicious clicks from massive click logs, therefore efficient detection methods in bigdata framework are much desired to combat this fraudulent behavior. In this paper, we propose a three-stage filtering system to attack click fraud. The serialized filters effectively detect the malicious clicks with decreasing confidence that can satisfy both advertisers and content providers.
We introduce the component data for E-portfolio(Electronic portfolio). E-portfolio) is used to cllect works of students and aimed at learning evaluation, so the components of E-portfolio must be standardized. We do so...
详细信息
We introduce the component data for E-portfolio(Electronic portfolio). E-portfolio) is used to cllect works of students and aimed at learning evaluation, so the components of E-portfolio must be standardized. We do some research on the component data structure of E-portfolio. Based on the features of E-portfolio we use xml file as the storage format of E-portfolio. Thus we can define xsd file which is the structure file of xml file for the users. People can build their E-portfolio on the structure xsd file. In this way E-portfolio based on xsd structure are in same format. That helps for further E-portfolio share and evaluation.
暂无评论