A New Algorithm for Inferring User Search Goals with Feedback Sessions Abstract For a broad-topic and ambiguous query, different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very useful in improving search engine relevance and user experience. In this
A Log-based Approach to Make Digital Forensics Easier on Cloud Computing Abstract Cloud computing is getting more and more attention from the information and communication technologies industry recently. Almost all the leading companies of the information area show their interesting and efforts on cloud computing and release services about cloud computing in succession. But if
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Abstract Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud based on the cloud
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data Abstract Feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time
Vampire Attacks Draining Life from Wireless Ad Hoc Sensor Networks Abstract Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data Abstract Cloud computing has emerging as a promising pattern for data outsourcing and high quality data services. However, concerns of sensitive information on cloud potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable symmetric encryption
Toward a Statistical Framework for Source Anonymity in Sensor Networks Abstract We present a new framework for modeling, analyzing and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of “interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it
T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence Abstract This paper presents a smart driving direction system leveraging the intelligence of experienced drivers. In this system,GPS-equipped taxis are employed as mobile sensors probing the traffic rhythm of a city and taxi drivers’ intelligence in choosing drivingdirections in the physical world. We propose a time-dependent landmark
Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks Abstract This work studies the problem of tracking signal-emitting mobile targets using navigated mobile sensors based on signal reception. Since the mobile target’s maneuver is unknown, the mobile sensor controller utilizes the measurement collected by a wireless sensor network in terms of the mobile target
SybilDefender Defend Against Sybil Attacks in Large Social Networks Abstract Here the sybil Attacks Distributed systems without trusted identities are particularly Week able to sybil attacks, where an again stars creates multiple Untruth full identities to compromise the running of the system. Here we dedicate SybilDefender, a sybil defense mechanism that leverages the network topologies