The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
database to the cloud server. In this context, privacy is a primary challenge and it is necessary to fulfill main privacy requirements of database owners and clients. This paper presents protocols for executing keyword search and aggregate SQL queries that preserve the privacy of both the client and the database owner. Client
Polynomial evaluation is an important tool in constructing many cryptographic protocols, such as proof of retrievability and verifiable keyword search. However, for the high degree polynomials derived from very large datasets, polynomial evaluation becomes an intractable problem, especially for resource limited
parallel graphics processors(GPUs). The signature matching schema proposed is based on port matching and keyword matching in each packet header. A real system on graphics processor units was implemented to evaluate the efficacy of our design. Experimental results proved that signature matching can be efficiently done on
first discover the latent relationship among n-grams by first grouping protocol messages with the same semantics and then inferring message formats by keyword based clustering and cluster sequence alignment. We implemented and evaluated ProDecoder to infer message format specifications of SMB (a binary protocol) and SMTP
generate an inverted index M of form (keywordi, documenti, 1, documenti, αi). Finally, a (m, n)-Bloom-Filter with storage is activated to generate matched documents according to the specified query criteria; 3) in the third fold, we show that the proposed query processing protocol on
limited computing resources. Practical issues such as the encryption of probabilities and the effect of finite precision on the accuracy of probabilistic inference are considered. The protocol is implemented in software and used for secure keyword recognition.
Based on LabVIEW software platform, an ECU calibration system was developed. The communication protocol is Keyword Protocol 2000, which is the universal serial communication Protocol in international automobile industry. This system has vivid and intuitive interface that can realize real-time displaying of monitoring
to be the best approach in the literature. In this paper, however, we show that their proposal seems unlikely to be implementable with the latest technology, due to a large amount of computation cost involved. Then, we provide an improved method to turn the keyword search more practical, which cannot only avoid the
Mobility has become a keyword nowadays with the evolution of mobile devices market and proliferation of real-time services. IP Multimedia Subsystem (IMS) is a single, standardized service framework that supports voice, video, data and messaging services, but does not provide seamless mobility for packet based sessions
. Especially as a part of the interest router table, each K-bucket stores a certain number of the peers' information that have high interest similarity. The query can be executed in the appropriate k-bucket by calculating interest similarity and interest keyword. Through mining the latent interest, we found that two peers having
This paper proposes a new double-private protocol for fuzzy matching and $\epsilon$-fuzzy matching. Many works have been done for private database search in which the keyword that a user inputs for the search is concealed to the database owner. In these database searches, the exactly matched data are returned
Cloud computing has provided a global infrastructure for knowledge-intensive service functions. A keyword-based search engine such as Google has remarkable capabilities for knowledge-intensive service functions. But from the view point of privacy preserving, they are far from being sufficient. The privacy preserving
In this paper, we describe a new primitive for error-tolerant searchable encryption and a security model for it. This generic scheme permits to make searches on encrypted data with only an approximation of some keyword. It enables to efficiently query secure databases in order to get the exact data with a close
In encrypted search, a server holds an encrypted database of documents but not the keys under which the documents are encrypted. The server answer keyword queries from a client with the list of documents matching the query.
A "keywords cloud" learning interest/difficult reminding system based on learners' video watching logs and subtitles is proposed for promoting self-paced MOOC learning. By identifying the hot video segments (via video seek event counts) and weighting the keywords of hot video segments, we are able to
In this paper is presented a method for automated generation of medical recommendations, using the combined power of the topic maps and expert systems. To obtain new knowledge from topic maps and to integrate this knowledge with a medical decision making systems, keywords for interrogation are needed. The keywords
Smart grid is an emerging technology because of its attractive features, such as distributed energy control and robust load fluctuation management. Demand Response (DR) system is an important component of smart grid as it can help maintaining demand-supply balance and controlling electricity bills at the user end. One of the visions of smart grid technology is communication between consumers and suppliers...
Cloud computing offers remote resources on top of which users can deploy their own services, as well as ready to use services. Computing resources located in different sites and belonging to multiple providers can be used for a service. One requirement for the user to get access to cloud services is being connected with the remote computing resources. Similarly, interworking between computing resources...
Mashups have relatively simple, component-based development paradigms, yet few end users develop their own applications. To help turn end users into developers and innovators, the authors present two mashup platforms for lightweight Web development practices and discuss open challenges.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.