A New Algorithm for Inferring User Search Goals with Feedback Sessions

A New Algorithm for Inferring User Search Goals with Feedback Sessions Abstract For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very useful in improving search engine relevance and user experience. In this

A Log-based Approach to Make Digital Forensics Easier on Cloud Computing

A Log-based Approach to Make Digital Forensics Easier on Cloud Computing Abstract Cloud computing is getting more and more attention from the information and communication technologies industry recently. Almost all the leading companies of the information area show their interesting and efforts on cloud computing and release services about cloud computing in succession. But if

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Abstract Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud based on the cloud

A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data Abstract Feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time

Vampire Attacks Draining Life from Wireless Ad Hoc Sensor Networks

Vampire Attacks Draining Life from Wireless Ad Hoc Sensor Networks Abstract Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing

Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data

Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data Abstract Cloud computing has emerging as a promising pattern for data outsourcing and high quality data services. However, concerns of sensitive information on cloud potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable symmetric encryption

Toward a Statistical Framework for Source Anonymity in Sensor Networks

Toward a Statistical Framework for Source Anonymity in Sensor Networks Abstract We present a new framework for modeling, analyzing and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of “interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it

T-Drive Enhancing Driving Directions with Taxi Driver’s Intelligence

T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence Abstract This paper presents a smart driving direction system leveraging the intelligence of experienced drivers. In this system,GPS-equipped taxis are employed as mobile sensors probing the traffic rhythm of a city and taxi drivers’ intelligence in choosing drivingdirections in the physical world. We propose a time-dependent landmark

Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks Abstract This work studies the problem of tracking signal-emitting mobile targets using navigated mobile sensors based on signal reception. Since the mobile target’s maneuver is unknown, the mobile sensor controller utilizes the measurement collected by a wireless sensor network in terms of the mobile target

SybilDefender Defend Against Sybil Attacks in Large Social Networks

SybilDefender Defend Against Sybil Attacks in Large Social Networks Abstract Here the sybil Attacks Distributed systems without trusted identities are particularly Week able to sybil attacks, where an again stars creates multiple Untruth full  identities to compromise the running of the system. Here we dedicate SybilDefender, a sybil defense mechanism that leverages the network topologies