Search
Now showing items 1-7 of 7
Empowering users of cloud computing on data confidentiality
(
IEEE
, 2014 , Conference Paper)
Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ...
The similarity-aware relational intersect database operator
(
Springer International Publishing
, 2014 , Conference Paper)
Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ...
Using the Sadakane compressed suffix tree to solve the all-pairs suffix-prefix problem
(
Hindawi
, 2014 , Article)
The all-pairs suffix-prefix matching problem is a basic problem in string processing. It has an application in the de novo genome assembly task, which is one of the major bioinformatics problems. Due to the large size of ...
Parallelizing exact motif finding algorithms on multi-core
(
Springer Science+Business Media
, 2014 , Article)
The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ...
Automatic generation of optimized workflow for distributed computations on large-scale matrices
(
Springer Verlag
, 2014 , Conference Paper)
Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...
A model driven framework for secure outsourcing of computation to the cloud
(
IEEE Computer Society
, 2014 , Conference Paper)
This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ...
Reasoning about security policies of services using answer set programming
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...