With growing popularity of ontologies as semantics-aware integration solutions, various ontology merging methods have been proposed. Each of them uses their own set of criteria to determine a desirable merge result. I...
详细信息
SciCloud is a project studying the scope of establishing private clouds at universities. With these clouds, researchers can efficiently use the already existing resources in solving computationally intensive scientifi...
详细信息
Capital expenditure (CAPEX), i.e. equipment cost, is a decisive criterion for the design of a new network infrastructure. The design of efficient transport networks requires the interconnection of multiple technologie...
详细信息
To obtain a knowledge graph representing a domain of interest, it is often necessary to combine several, independently developed ontologies. Existing approaches are mostly limited to binary merge and lack scalability....
详细信息
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter descr...
详细信息
ISBN:
(纸本)9781595936493
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter describes the essential concepts, the alternative models, and the suite of techniques for providing location privacy in mobile and ubiquitous data management systems. The tutorial consists of two main components. First, we will introduce location privacy threats and give an overview of the state of art research in data privacy and analyze the applicability of the existing data privacy techniques to location privacy problems. Second, we will present the various location privacy models and techniques effective in either the privacy policy based framework or the location anonymization based framework. The discussion will address a number of important issues in both data privacy and location privacy research, including the location utility and location privacy trade-offs, the need for a careful combination of policy-based location privacy mechanisms and location anonymization based privacy schemes, as well as the set of safeguards for secure transmission, use and storage of location information, reducing the risks of unauthorized disclosure of location information. The tutorial is designed to be self-contained, and gives the essential background for anyone interested in learning about the concept and models of location privacy, and the principles and techniques for design and development of a secure and customizable architecture for privacy-preserving mobile data management in mobile and pervasive information systems. This tutorial is accessible to data management administrators, mobile location based service developers, and graduate students and researchers who are interested in data management in mobile information syhhhstems, pervasive computing, and data privacy. Copyright 2007 VLDB Endowment, ACM.
We present the concept of cooperative vision and its application to a multi-agent system with special attention to the integration of vision. Cooperative vision can be described as a type of distributed vision, where ...
详细信息
The Artificial Hormone System (AHS) is a self organizing system which allocates tasks to processing elements. It works in a distributed way, is able to hold real-time conditions and can run in a mixed-signal chip envi...
详细信息
Today, a typical telemedicine system involves a small set of hospitals providing remote healthcare services to a small section of the society using nodal centers, mobile health units, etc. However, the benefits of a t...
详细信息
ISBN:
(纸本)9789898111784
Today, a typical telemedicine system involves a small set of hospitals providing remote healthcare services to a small section of the society using nodal centers, mobile health units, etc. However, the benefits of a telemedicine system increase with scale. One of the key requirements of such a large scale system is to allow large numbers of patient medical records, in the form of electronic files, to be efficiently stored and accessed from widely distributed locations. In this paper, we address the need for a distributed file system to manage patient data in large scale telemedicine systems. We use the resources of unreliable Internet edge nodes distributed among hospitals, labs, etc., to provide reliable file system services to patients and doctors. Besides building an Internet-based system that scales with the number of nodes and files, we also attempt to optimize record access times for doctors to provide timely responses.
Ontologies encode a community's understanding of a domain and are thus subjective. Different communities may create different models of overlapping domains. If they need to be integrated, this may cause problems: ...
详细信息
The Jaro-Winkler similarity is a widely used measure for the similarity of strings. We propose an efficient algorithm for the bounded search of similar strings in a large set of strings. We compared our approach to th...
详细信息
暂无评论