User behavior analysis has played an important role in Web information retrieval. Rare queries, whose frequencies are rather low, are usually ignored in existing studies due to the data sparseness. Little has been kno...
详细信息
For parallel applications running on high-performance clusters, performance is usually satisfied without paying much attention to energy consumption. In this paper, we develop a new scheduling algorithm called Energy ...
详细信息
High performance heterogeneous clusters have been widely used to commercial and scientific areas. However, huge energy consumption has prevented the further application of large-scale heterogeneous clusters. It is hig...
详细信息
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t...
详细信息
By using virtual instrument technology, a direct digital control bioreactor is developed, which is able to be remote controlled through internet. Mathematical model of the bioreaction system is developed, which is use...
详细信息
In this paper, we present a novel color-mood-aware technique to re-texture clothing in a photograph. An efficient classification algorithm is developed to classify clothing textures using color mood scheme. To re-text...
详细信息
It have become very difficult that users can find the best, credible web service for some proposed semantic web service discovery methods, because web service environment has become open, autonomic, dynamic, and decep...
详细信息
It have become very difficult that users can find the best, credible web service for some proposed semantic web service discovery methods, because web service environment has become open, autonomic, dynamic, and deceptive. This paper proposes a QoS-assured trust-driven semantic web service discovery method i.e. TDSWSD. This method, firstly, describes and labels web services by ontology technology, and then makes use of the existing keyword matching method to carry basic matching;secondly, function matching will be done by ontology-based concept semantic similarity calculation method;finally, QoS-assured trust measure method will be designed to carry credible QoS matching. Compared with existing methods, the experimental results show that this method can not only automatically find the service to meet user' requirements, but also ensure the validity and reliability of service discovery.
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ...
详细信息
Resources shared in e-science have critical requirements on *** subjective trust management is essential to guarantee users' collaborations and communications on such a promising *** an important nature of subjective...
详细信息
Resources shared in e-science have critical requirements on *** subjective trust management is essential to guarantee users' collaborations and communications on such a promising *** an important nature of subjective trust,uncertainty should be preserved and exhibited in trust definition,representation and *** the drawbacks of existing mechanisms based on random mathematics and fuzzy theory,this paper designs an uncertainty enhanced trust evolution strategy based on cloud model *** define subjective trust as trust *** we propose new algorithms to propagate,aggregate and update ***,based on the concept of similar cloud,a method to assess trust level is put *** simulation results show the effiectiveness,rationality and efficiency of our proposed strategy.
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t...
详细信息
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are to solve portability problems instead of rational sharing between different users who are not family members. In this work, we propose an initial step toward this rational sharing and present a general sharing model based on proxy re-encryption. Our model can support the flexible sharing mechanism, with which the user can choose any of the purchased content to share with any legal device, and the content provider can know and limit the number of sharing devices to achieve some novel DRM policies such as pay-per-sharing. To our best knowledge, our sharing model is the first model for content sharing between different users' devices who are not family members using proxy re-encryption. With rational applications, our model can benefit for both the user and content provider to achieve win-win development.
暂无评论