CAPTCHA technology is at a boom in the field of information security. When text CAPTCHAs are at a point of break down, it is the time for the image based CAPTCHAs to get a pace. But often the designers of the CAPTCHA ...
详细信息
In the rising tide of the Internet of things, more and more things in the world are connected to the Internet. Recently, data have kept growing at a rate more than four times of that expected in Moore's law. This exp...
详细信息
In the rising tide of the Internet of things, more and more things in the world are connected to the Internet. Recently, data have kept growing at a rate more than four times of that expected in Moore's law. This explosion of data comes from various sources such as mobile phones, video cameras and sensor networks, which often present multidi- mensional characteristics. The huge amount of data brings many challenges on the management, transportation, and pro- cessing IT infrastructures. To address these challenges, the state-of-art large scale data center networks have begun to provide cloud services that are increasingly prevalent. How- ever, how to build a good data center remains an open chal- lenge. Concurrently, the architecture design, which signifi- cantly affects the total performance, is of great research inter- est. This paper surveys advances in data center network de- sign. In this paper we first introduce the upcoming trends in the data center industry. Then we review some popular design principles for today's data center network architectures. In the third part, we present some up-to-date data center frame- works and make a comprehensive comparison of them. Dur- ing the comparison, we observe that there is no so-called op- timal data center and the design should be different referring to the data placement, replication, processing, and query pro- cessing. After that, several existing challenges and limitations are discussed. According to these observations, we point out some possible future research directions.
With bandwidth increasing at a constant pace, technology in education has become an important part for delivery of educational content to students. Online learning in various forms is gaining popularity but lacks the ...
详细信息
Denial of Service (DoS) attacks has become a major problem for users of computer systems connected to the Internet. DoS attackers hijack secondary victim systems and use them to wage a coordinated large-scale attack a...
详细信息
Recently, the necessity for power saving in Wireless Sensor Networks (WSNs) is crucial particularly in mission essential fields like military and medical applications. A communication network consists of nodes, every ...
详细信息
This paper describes flexibility and effectiveness of Execution Preserving Language Transformation (EPLT) using a meta framework. Program transformation is visualized as transforming the program written in legacy code...
详细信息
作者:
S. SuriyaS. P. ShantharajahAssistant Professor
Department of Computer Science and Engineering Velammal College of Engineering and Technology Madurai Tamilnadu India. Professor
Department of Master of Computer Applications Sona College of Technology Salem Tamilnadu India.
Data mining involves analysis, extraction, refining and representation of required data from large databases. kDCI (k Direct Count and Intersect) algorithm is one of the best scalable algorithms for identifying freque...
详细信息
ISBN:
(纸本)9781467349215
Data mining involves analysis, extraction, refining and representation of required data from large databases. kDCI (k Direct Count and Intersect) algorithm is one of the best scalable algorithms for identifying frequent items in huge repository of data. This algorithm uses a special kind of compressed data structure which helps in mining the datasets easily. Apriori algorithm, a realization of frequent pattern matching, is universally adopted for reliable mining. It is based on parameters namely support and confidence. kDCI algorithm is hybridized with Apriori algorithm for better performance than their individual contribution. The result proves scalability and mining speed effectively.
In this paper, we propose an efficient code-based 1-out-of-N oblivious transfer, OT1N, based on McEliece assumptions without invoking the OT12 several times as in the paradigm proposed in [20,6]. We also show that the...
详细信息
The present scenario has been conquered by the wireless network. It is well understood that the future will also be tied up by the same network. The ad hoc network plays a pivotal role in making communication among no...
详细信息
暂无评论