The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In cloud storage systems, users can upload their data along with associated tags (authentication information) to cloud storage servers. To ensure the availability and integrity of the outsourced data, provable data possession (PDP) schemes convince verifiers (users or third parties) that the outsourced data stored in the cloud storage server is correct and unchanged. Recently, several PDP schemes...
Quantitative research has been extensively applied in sociology. The traditional way of using data statistical computing tools of R, SPSS and Stata on the stand-alone machine can't deal with the challenges of big data; furthermore, the demand of complex computing in mobile condition is increasing due to the fieldwork characteristics of sociological researchers. Considering the computing needs of sociological...
In recent times the role of information technology in the business enterprises has emerged with new levels of services, storage requirements, resource management and availability. As the amount of data that is available now a days is too huge for a single organization to control and manage so here putting the data on cloud can act as a savior. In this paper the advantages, various service and deployment...
Dynamic specification mining extracts candidate specifications from logs of execution traces. Existing algorithms differ in the kinds of traces they take as input and in the kinds of candidate specification they present as output. One challenge common to all approaches relates to the faithfulness of the mining results: how can we be confident that the extracted specifications faithfully characterize...
Tool-based code review is growing in popularity and has become a standard part of the development process at Mi-crosoft. Adoption of these tools makes it possible to mine data from code reviews and provide access to it. In this paper, we pre-sent an experience report for CodeFlow Analytics, a system that collects code review data, generates metrics from this data, and provides a number of ways for...
Cloud mining is an incorporation of two robust technologies viz. Data mining and cloud storage and computing. Data mining has a vast scope in various fields, but when it is applied on a cloud platform, whose purpose is to provide seamless service; it adds value to the concept. The general idea is to research and test association mining algorithms and also to build a practical application which can...
Mining large data requires intensive computing resources and data mining expertise, which might not be available for many users. With the development of cloud computing and services computing, data mining tasks can now be moved to the cloud or outsourced to third parties to save costs. In this new paradigm, data and model confidentiality becomes the major concern to the data owner. Meanwhile, users...
Chemistry and nuclear physics represent one of possible options of large area for practical data mining applications. Radio-active nuclides are related with many sectors, such as medicine or industry. Successful detection and identification of radio-nuclides allows the realization of specific safety precaution and then increasing of security level in nuclear power plants, or medicine institutes. Data...
In today's “era of Tera”, everything is possible in terms of storage and service. The long-held dream of computing as a utility has been achieved in the form of cloud computing. It has transformed the world where large part of IT industry is simplified by Platform as a Service, Software's are developed and rented more attractively in the form of Development as a Service, Software as a Service. It...
With the development of mobile web integration technologies and wireless sensor networks, the interactive activities of human society increasingly rely on the heterogeneous network environment including the communication network, the Internet and sensor networks. This paper tries to apply socially aware computing and data mining to the mobile web application integration technology. It emphasizes understanding...
Fault tolerance is an important issue in service oriented architectures like Grid and Cloud systems, where many and heterogeneous machines are used. In this paper we present a flexible failure handling framework which extends a service-oriented architecture for Distributed Data Mining previously proposed, addressing the requirements for handling fault tolerance in service-oriented Grids. In particular,...
We present a Systematic Literature Review (SLR) on Cloud Computing that selected 39 papers from first tier journals and conferences in the period 2008-2012. The selective approach captures the relevant points of view on Cloud Computing, namely the overall paradigm in terms of delivery and deployment. Afterwards, we point out the technological issues about networking and data management in Cloud Computing...
In privacy-preserving data mining, a number of parties would like to jointly learn a function of their private data sets in a way that no information about their inputs, beyond the output itself, is revealed as a result of such computation. Yang et al. 2010 showed that several popular data mining algorithms can be reduced to three basic operations, secure implementation of which -- termed Secure Product...
S4 is a general-purpose, distributed, scalable, partially fault-tolerant, pluggable platform that allows programmers to easily develop applications for processing continuous unbounded streams of data. Keyed data events are routed with affinity to Processing Elements (PEs), which consume the events and do one or both of the following: (1) emit one or more events which may be consumed by other PEs,...
Personal Space of Information (PSI) is the whole information collection about or of the person which can be the important resource to mine personal competence, personal task and corresponding required knowledge which can be converted to the evidence of individual competence and update the competence model. This paper analysis the character of PSI and introduces the method of competence modeling automatically...
As knowledge and rules are hided in e-commerce data, how to mine them is not achieved well in the present e-commerce. IEC (Intelligent E-commerce) is proposed as the next period e-commerce and main feature is to mine e-commerce knowledge and rules from e-commerce data. An Extended K-Means algorithm is proposed to analyze customers' consumptions in the IEC and results indicate that the performance...
With frequently network attacks, network security products are practically impossible to guard against the intrusion methods. A model of online attack detection for computer forensics is proposed to collect crime evidence of attack. In this model, an algorithm of association rules mining is used to mine the association rules of attack event and build the attack signature database. After gaining network...
As data sizes continue to increase, the concept of active storage is well fitted for many data analysis kernels. Nevertheless, while this concept has been investigated and deployed in a number of forms, enabling it from the parallel I/O software stack has been largely unexplored. In this paper, we propose and evaluate an active storage system that allows data analysis, mining, and statistical operations...
The multidimensional data model has emerged during the last decade for facilitating the analysis of huge datasets to help in decision-making. This data model can be effectively utilized for analyzing meteorological datasets that are too huge and detailed. In this paper, the technology of dimension modeling has been made use of for analyzing Rainfall and Low Pressure system datasets for the years 1984-2003...
In existent researches of trustworthiness-based grid access control systems, an important question has not been resolved well: what types of historical behaviors should be chosen to measure trustworthiness. An access control model based on trustworthiness is designed in this paper. To measure trustworthiness of a certain user when he accesses to relevant resource, two types of historical behaviors...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.