Computer Society of India

Displaying 1-6 of 6 results

  • White Papers // Mar 2013

    Advanced Trustworthy Infrastructure for Mobile Cloud (TIM CLOUD) to Ensure Security, Privacy and Trust

    Mobile cloud computing is one of the today's most exciting technologies because of its ability to use the cloud through the smart phones, reduce the costs associated with computing, increased elasticity and scalability. However the proactive security mechanisms for vulnerability management are inadequate in dynamic mobile virtualized environment. This paper...

    Provided By Computer Society of India

  • White Papers // Dec 2012

    Hybrid HBase: Leveraging Flash SSDs to Improve Cost per Throughput of HBase

    Column-oriented data stores, such as BigTable and HBase, have successfully paved the way for managing large key-value datasets with random accesses. At the same time, the declining cost of flash SSDs has enabled their use in several applications including large databases. In this paper, the authors explore the feasibility of...

    Provided By Computer Society of India

  • White Papers // Dec 2012

    A Novel Query-Based Approach for Addressing Summarizability Issues in XOLAP

    The business intelligence and decision-support systems used in many application domains casually rely on data warehouses, which are decision-oriented data repositories modeled as Multi-Dimensional (MD) structures. MD structures help navigate data through hierarchical levels of detail. In many real-world situations, hierarchies in MD models are complex, which causes data aggregation...

    Provided By Computer Society of India

  • White Papers // Sep 2012

    Architecture for Integrated and Intelligent Security for Mobile Web Services

    Web services technology has revolutionized the software industry dramatically by the development and integration of a variety of enterprise web applications thereby facilitating the web users to access them. Due to the advances in wireless and mobile networks and the proliferation of mobile devices, the mobile web services become a...

    Provided By Computer Society of India

  • White Papers // Dec 2009

    Trust-Based Infinitesimals for Enhanced Collaborative Filtering

    In this paper, the authors propose a novel recommender system which enhances user-based collaborative filtering by using a trust-based social network. Their main idea is to use infinitesimal numbers and polynomials for capturing natural preferences in aggregating opinions of trusted users. They use these opinions to "Help" users who are...

    Provided By Computer Society of India

  • White Papers // Dec 2008

    Ambiguity: Hide the Presence of Individuals and Their Privacy With Low Information Loss

    Publishing a database instance containing individual information poses two kinds of privacy risk: Presence leakage, by which the attackers can explicitly identify individuals in (or not in) the database, and association leakage, by which the attackers can unambiguously associate individuals with sensitive information. However, the existing privacy-preserving data publishing techniques...

    Provided By Computer Society of India

  • White Papers // Dec 2008

    Ambiguity: Hide the Presence of Individuals and Their Privacy With Low Information Loss

    Publishing a database instance containing individual information poses two kinds of privacy risk: Presence leakage, by which the attackers can explicitly identify individuals in (or not in) the database, and association leakage, by which the attackers can unambiguously associate individuals with sensitive information. However, the existing privacy-preserving data publishing techniques...

    Provided By Computer Society of India

  • White Papers // Dec 2009

    Trust-Based Infinitesimals for Enhanced Collaborative Filtering

    In this paper, the authors propose a novel recommender system which enhances user-based collaborative filtering by using a trust-based social network. Their main idea is to use infinitesimal numbers and polynomials for capturing natural preferences in aggregating opinions of trusted users. They use these opinions to "Help" users who are...

    Provided By Computer Society of India

  • White Papers // Dec 2012

    Hybrid HBase: Leveraging Flash SSDs to Improve Cost per Throughput of HBase

    Column-oriented data stores, such as BigTable and HBase, have successfully paved the way for managing large key-value datasets with random accesses. At the same time, the declining cost of flash SSDs has enabled their use in several applications including large databases. In this paper, the authors explore the feasibility of...

    Provided By Computer Society of India

  • White Papers // Dec 2012

    A Novel Query-Based Approach for Addressing Summarizability Issues in XOLAP

    The business intelligence and decision-support systems used in many application domains casually rely on data warehouses, which are decision-oriented data repositories modeled as Multi-Dimensional (MD) structures. MD structures help navigate data through hierarchical levels of detail. In many real-world situations, hierarchies in MD models are complex, which causes data aggregation...

    Provided By Computer Society of India

  • White Papers // Sep 2012

    Architecture for Integrated and Intelligent Security for Mobile Web Services

    Web services technology has revolutionized the software industry dramatically by the development and integration of a variety of enterprise web applications thereby facilitating the web users to access them. Due to the advances in wireless and mobile networks and the proliferation of mobile devices, the mobile web services become a...

    Provided By Computer Society of India

  • White Papers // Mar 2013

    Advanced Trustworthy Infrastructure for Mobile Cloud (TIM CLOUD) to Ensure Security, Privacy and Trust

    Mobile cloud computing is one of the today's most exciting technologies because of its ability to use the cloud through the smart phones, reduce the costs associated with computing, increased elasticity and scalability. However the proactive security mechanisms for vulnerability management are inadequate in dynamic mobile virtualized environment. This paper...

    Provided By Computer Society of India