Computer Science & Engineering: المرسلات الحديثة
السجلات المعروضة 261 -- 280 من 2484
-
A system for automatic gathering and intelligent analyses of Doha traffic data
( Institute of Electrical and Electronics Engineers Inc. , 2008 , Conference)In recent years, Intelligent Transportation Systems (ITS) have gained increased attention. ITS [1] [2] provide opportunities for traffic engineers and decision-makers to deal with problems related to highway traffic operation ... -
Anonymizing transactional datasets
( IOS Press , 2015 , Article)In this paper, we study the privacy breach caused by unsafe correlations in transactional data where individuals have multiple tuples in a dataset. We provide two safety constraints to guarantee safe correlation of the ... -
Secure outsourcing of network flow data analysis
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference)In this paper, we identify a new and challenging application for the growing field of research on data anonymization and secure outsourcing of storage and computations to the cloud. Network flow data analysis is of high ... -
Efficient alignment of next generation sequencing data using MapReduce on the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2012 , Conference)This paper presents a methodology for running NGS read mapping tools in the cloud environment based on the MapReduce programming paradigm. As a demonstration, the recently developed and robust sequence alignment tool, ... -
AICCSA 08 - 6th IEEE/ACS International Conference on Computer Systems and Applications: Message from the general chairs
( Institute of Electrical and Electronics Engineers Inc. , 2008 , Article)Presents the introductory welcome message from the conference proceedings. -
Secure and efficient outsourcing of sequence comparisons
( Springer , 2012 , Conference)We treat the problem of secure outsourcing of sequence comparisons by a client to remote servers, which given two strings λ and μ of respective lengths n and m, consists of finding a minimum-cost sequence of insertions, ... -
Maintaining database anonymity in the presence of queries
( Springer , 2013 , Conference)With the advent of cloud computing there is an increased interest in outsourcing an organization's data to a remote provider in order to reduce the costs associated with self-hosting. If that database contains information ... -
Secure and private outsourcing of shape-based feature extraction
( Springer , 2013 , Conference)There has been much recent work on secure storage outsourcing, where an organization wants to store its data at untrusted remote cloud servers in an encrypted form, such that its own employees can query the encrypted data ... -
Association rule mining on fragmented database
( Springer , 2015 , Conference)Anonymization methods are an important tool to protect privacy. The goal is to release data while preventing individuals from being identified. Most approaches generalize data, reducing the level of detail so that many ... -
Using safety constraint for transactional dataset anonymization
( Springer , 2013 , Conference)In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset. We provide a safe grouping principle to ensure that correlated values are grouped together in unique ... -
Smart grid public datasets: Characteristics and associated applications
( John Wiley and Sons Inc , 2024 , Article Review)The development of smart grids, traditional power grids, and the integration of internet of things devices have resulted in a wealth of data crucial to advancing energy management and efficiency. Nevertheless, public ... -
Efficient processing of hamming-distance-based similarity-search queries over MapReduce
( OpenProceedings.org, University of Konstanz, University Library , 2015 , Conference)Similarity search is crucial to many applications. Of particular interest are two flavors of the Hamming distance range query, namely, the Hamming select and the Hamming join (Hamming-select and Hamming-join, respectively). ... -
Towards On-Device Dehydration Monitoring Using Machine Learning from Wearable Device's Data
( MDPI , 2022 , Article)With the ongoing advances in sensor technology and miniaturization of electronic chips, more applications are researched and developed for wearable devices. Hydration monitoring is among the problems that have been recently ... -
Decentralized broadcast encryption schemes with constant size ciphertext and fast decryption
( MDPI AG , 2020 , Article)Broadcast encryption (BE) allows a sender to encrypt a message to an arbitrary target set of legitimate users and to prevent non-legitimate users from recovering the broadcast information. BE has numerous practical ... -
An efficient secure data compression technique based on chaos and adaptive Huffman coding
( Springer , 2021 , Article)Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and communication time. Nevertheless, compression ... -
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin
( Springer , 2018 , Conference)In CANS 2016, Chen, Laing, and Martin proposed an ideal (t, n)-threshold secret sharing scheme (the CLM scheme) based on random linear code. However, in this paper we show that this scheme is essentially same as the one ... -
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
( Springer , 2022 , Conference)When users store encrypted data in a cloud environment, it is important for users to ask cloud to carry out some computation on the remote data remotely. ORAM is a good potential approach to carry out this kind of remote ... -
Preface : Distributed Computing and Artificial Intelligence, 12th International Conference
( Springer , 2015 , Other)The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for solving complex problems in these areas. The exchange ... -
Distributed computing and artificial intelligence, 12th international conference
( Springer , 2015 , Conference)The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for studying and solving complex problems. The exchange of ... -
Temporal self-attention for risk prediction from electronic health records using non-stationary kernel approximation
( Elsevier , 2024 , Article)Effective modeling of patient representation from electronic health records (EHRs) is increasingly becoming a vital research topic. Yet, modeling the non-stationarity in EHR data has received less attention. Most existing ...