android app

PRIVACY-PRESERVING RELATIVE LOCATION BASED SERVICES FOR MOBILE USERS

ABSTRACT: Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as…

5 years ago

PRIVACY-PRESERVING RELATIVE LOCATION BASED SERVICES FOR MOBILE USERS

ABSTRACT: Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as…

5 years ago

PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE

ABSTRACT: Statistics from security firms, research institutions and government organizations show that the numbers of data-leak instances have grown rapidly…

5 years ago

PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES

 ABSTRACT: With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as…

5 years ago

PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES

 ABSTRACT: With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as…

5 years ago

Android Classes inheriting from the Activity superclass

Android Classes inheriting from the Activity superclass Intents and Android context In Android systems, applications run in compartmentalized environments so…

5 years ago

PREDICTING ASTHMA-RELATED EMERGENCY DEPARTMENT VISITS USING BIG DATA

ABSTRACT: Asthma is one of the most prevalent and costly chronic conditions in the United States which cannot be cured.…

5 years ago

PREDICTING ASTHMA-RELATED EMERGENCY DEPARTMENT VISITS USING BIG DATA

ABSTRACT: Asthma is one of the most prevalent and costly chronic conditions in the United States which cannot be cured.…

5 years ago

PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD COMPUTING

ABSTRACT: An initiative data prefetching scheme on the storage servers in distributed file systems for cloud computing. In this prefetching…

5 years ago

PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD COMPUTING

ABSTRACT: An initiative data prefetching scheme on the storage servers in distributed file systems for cloud computing. In this prefetching…

5 years ago

PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKSCATTER

ABSTRACT: It is long known attackers may use forged source IP address to conceal their real locations. To capture the…

5 years ago

PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKSCATTER

ABSTRACT: It is long known attackers may use forged source IP address to conceal their real locations. To capture the…

5 years ago

Optimal Configuration of Network Coding in Ad Hoc Networks

Abstract:  Analyze the impact of network coding (NC) configuration on the performance of ad hoc networks with the consideration of…

5 years ago

Optimal Configuration of Network Coding in Ad Hoc Networks

Abstract:  Analyze the impact of network coding (NC) configuration on the performance of ad hoc networks with the consideration of…

5 years ago

ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS

ABSTRACT: MapReduce job, we consider to aggregate data with the same keys before sending them to remote reduce tasks. Although…

5 years ago

ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS

ABSTRACT: MapReduce job, we consider to aggregate data with the same keys before sending them to remote reduce tasks. Although…

5 years ago

Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

Abstract Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community to…

5 years ago

Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

Abstract Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community to…

5 years ago

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

ABSTRACT: In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that…

5 years ago

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

ABSTRACT: In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that…

5 years ago