Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but i...
详细信息
With advent of gaining popularity in cloud computing, there is an increase in demand of resources among the heterogeneous workload types on cloud. Resource management is a key challenging problem that is faced by the ...
详细信息
The growths of internet, Global Positioning System (GPS) and wireless telecommunication technologies have opened new avenues in potential area of mobile computing called Location Based Services (LBS). Recommendation o...
详细信息
ISBN:
(纸本)9781849195508
The growths of internet, Global Positioning System (GPS) and wireless telecommunication technologies have opened new avenues in potential area of mobile computing called Location Based Services (LBS). Recommendation of personalized information / services in location based services has become an attractive trend for success of businesses. A Recommender System attempts to solve the problem of information overload and provides product and service recommendation based on user profile and preferences. The location of the user is an important information item that can be associated to the existing user profile in order to provide efficient recommendations. Also, easy availability of GPS enabled devices brings a large amount of GPS trajectories representing user's mobile logs. These GPS trajectories can be used to mine interesting patterns about users. We have studied the utility and application of information extracted from user's GPS trajectory data in recommender systems. We conceive that recommendation has an intrinsic social component and therefore this work takes a perspective towards the social aspect in location based recommender systems. In this paper, we are presenting the stateof- the-art research trends, challenges and applications in the area of Location-Based Recommender Systems (LBRS).
information recommender system attempts to present information that is likely to be useful for the user. Some information recommender systems recommend persons which users are likely to follow in Twitter. Showing reco...
详细信息
One of the main challenges in content-based or semantic image retrieval is still to bridge the gap between low-level features and semantic information. In this paper, A two-phase hybrid knowledge base inference mechan...
详细信息
Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Lattice reduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence ...
详细信息
In our earlier studies, we have proposed an image morphing based steganography. The basic idea is to embed a secrete image into a stego image through morphing. The stego image is a morphed image obtained from the secr...
详细信息
ISBN:
(纸本)9781467317139
In our earlier studies, we have proposed an image morphing based steganography. The basic idea is to embed a secrete image into a stego image through morphing. The stego image is a morphed image obtained from the secrete image and some other reference images. To make this method more practically useful, it is essential to make the stego image as natural as possible. For this purpose, we should define a proper feature point set (FPS) for morphing. To find a good FPS efficiently, we use interactive differential evolution (IDE) in this paper. One problem in using IDE is that, in the evolution process the human user may change his/her evaluation criterion subconsciously. This is not desirable for finding an objective evaluation function based on the generated images. To solve this problem, we investigate the effectiveness of k-NN based feeling awareness, and propose a reminder for stabilizing the "user feeling" in the evolution process. Experimental results show that the reminder is useful for reducing the chance of criterion shift. Results also show that increasing k alone may not improve the performance of the reminder for user feeling modeling.
A novel clustering algorithm CMune is presented for the purpose of finding clusters of arbitrary shapes, sizes and densities in high dimensional feature spaces. It can be considered as a variation of the Shared Neares...
详细信息
Heterogeneous embedded systems are much more diverse in hardware architectures than ever before for processors and peripherals. On the other hand, software deployments are also varied such as service-oriented architec...
详细信息
DES is a kind of block cipher and before DES encryption the plain text be divided into the same-size blocks. But sometimes the plain text can't be divided into the exactly size. So padding step is needed to pad th...
详细信息
DES is a kind of block cipher and before DES encryption the plain text be divided into the same-size blocks. But sometimes the plain text can't be divided into the exactly size. So padding step is needed to pad the space of the block. The discussion of the block padding is the emphasis of this paper. A new padding method is given and at the last part of the paper the implementation of DES using new padding method is given.
暂无评论