Computer Science & Engineering: Recent submissions
Now showing items 201-220 of 2427
-
Approving updates in collaborative databases
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)Data curation activities in collaborative databases mandate that collaborators interact until they converge and agree on the content of their data. Typically, updates by a member of the collaboration are made visible to ... -
ConMR: Concurrent MapReduce programming model for large scale shared-Data applications
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference)The rapid growth of large-data processing has brought in the MapReduce programming model as a widely accepted solution. However, MapReduce limits itself to a onemap- To-one-reduce framework. Meanwhile, it lacks built-in ... -
Real-time traffic surveillance using ZigBee
( Institute of Electrical and Electronics Engineers Inc. , 2010 , Conference)This paper describes the design, implementation, and analysis of a proof-of-concept prototype of a traffic surveillance system. The system employs an in-vehicle device for collecting real-time traffic data. The device uses ... -
Scalable multi-core implementation for motif finding problem
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference)The motif finding problem is a key step for understanding the gene regulation and expression, drug design, disease resistance, etc. Many sequential algorithms have been proposed in the literature to find the exact motifs. ... -
A system for automatic gathering and intelligent analyses of Doha traffic data
( Institute of Electrical and Electronics Engineers Inc. , 2008 , Conference)In recent years, Intelligent Transportation Systems (ITS) have gained increased attention. ITS [1] [2] provide opportunities for traffic engineers and decision-makers to deal with problems related to highway traffic operation ... -
Anonymizing transactional datasets
( IOS Press , 2015 , Article)In this paper, we study the privacy breach caused by unsafe correlations in transactional data where individuals have multiple tuples in a dataset. We provide two safety constraints to guarantee safe correlation of the ... -
Secure outsourcing of network flow data analysis
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference)In this paper, we identify a new and challenging application for the growing field of research on data anonymization and secure outsourcing of storage and computations to the cloud. Network flow data analysis is of high ... -
Efficient alignment of next generation sequencing data using MapReduce on the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2012 , Conference)This paper presents a methodology for running NGS read mapping tools in the cloud environment based on the MapReduce programming paradigm. As a demonstration, the recently developed and robust sequence alignment tool, ... -
AICCSA 08 - 6th IEEE/ACS International Conference on Computer Systems and Applications: Message from the general chairs
( Institute of Electrical and Electronics Engineers Inc. , 2008 , Article)Presents the introductory welcome message from the conference proceedings. -
Secure and efficient outsourcing of sequence comparisons
( Springer , 2012 , Conference)We treat the problem of secure outsourcing of sequence comparisons by a client to remote servers, which given two strings λ and μ of respective lengths n and m, consists of finding a minimum-cost sequence of insertions, ... -
Maintaining database anonymity in the presence of queries
( Springer , 2013 , Conference)With the advent of cloud computing there is an increased interest in outsourcing an organization's data to a remote provider in order to reduce the costs associated with self-hosting. If that database contains information ... -
Secure and private outsourcing of shape-based feature extraction
( Springer , 2013 , Conference)There has been much recent work on secure storage outsourcing, where an organization wants to store its data at untrusted remote cloud servers in an encrypted form, such that its own employees can query the encrypted data ... -
Association rule mining on fragmented database
( Springer , 2015 , Conference)Anonymization methods are an important tool to protect privacy. The goal is to release data while preventing individuals from being identified. Most approaches generalize data, reducing the level of detail so that many ... -
Using safety constraint for transactional dataset anonymization
( Springer , 2013 , Conference)In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset. We provide a safe grouping principle to ensure that correlated values are grouped together in unique ... -
Smart grid public datasets: Characteristics and associated applications
( John Wiley and Sons Inc , 2024 , Article Review)The development of smart grids, traditional power grids, and the integration of internet of things devices have resulted in a wealth of data crucial to advancing energy management and efficiency. Nevertheless, public ... -
Efficient processing of hamming-distance-based similarity-search queries over MapReduce
( OpenProceedings.org, University of Konstanz, University Library , 2015 , Conference)Similarity search is crucial to many applications. Of particular interest are two flavors of the Hamming distance range query, namely, the Hamming select and the Hamming join (Hamming-select and Hamming-join, respectively). ... -
Towards On-Device Dehydration Monitoring Using Machine Learning from Wearable Device's Data
( MDPI , 2022 , Article)With the ongoing advances in sensor technology and miniaturization of electronic chips, more applications are researched and developed for wearable devices. Hydration monitoring is among the problems that have been recently ... -
Decentralized broadcast encryption schemes with constant size ciphertext and fast decryption
( MDPI AG , 2020 , Article)Broadcast encryption (BE) allows a sender to encrypt a message to an arbitrary target set of legitimate users and to prevent non-legitimate users from recovering the broadcast information. BE has numerous practical ... -
An efficient secure data compression technique based on chaos and adaptive Huffman coding
( Springer , 2021 , Article)Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and communication time. Nevertheless, compression ... -
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin
( Springer , 2018 , Conference)In CANS 2016, Chen, Laing, and Martin proposed an ideal (t, n)-threshold secret sharing scheme (the CLM scheme) based on random linear code. However, in this paper we show that this scheme is essentially same as the one ...