author: kuan ching li

Cloud Computing and Digital Media: Fundamentals, Techniques, and Applications

... list of records, where a record is a Map phase Shuffle phase Reduce phase Copy Sort list(K2,V2) Split Map task list(K 1 ,V 1 ) Output Copy Sort list(K2,V2) list(K list(V )) Merge Reducetask Copy Sort list(K2,V2) 2 , 2 list(K3,V3) list(K 1 , ...

Advances in Computing and Network Communications: Proceedings of CoCoNet 2020, Volume 2

... language using hyperspace analogue to language and fuzzy C-means clustering. In: Proceedings of the 12th International Conference on Natural Language Processing, pp. 49–58 (2015) 9. Palanti, D.P., Kolikipogu, R.: Decision list algorithm ...

Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 1-4, 2007, Proceedings

... wikipedia.org/wiki/FlashCrowd [2] Akamai, http://www.akamai.com [3] Pan, C., Atajanov, M., Hossain, M.B., Shimokawa, T., Yoshida, N.: FCAN: Flash Crowds Alleviation Network Using Adaptive P2P Overlay of Cache Proxies. IEICE Trans. on ...

Green, Pervasive, and Cloud Computing: 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings

... PPT adversary to distinguish the distributions of arbitrary x ∈ Xk and QCHFk (x, y) : ∀x ∈ Xk, ∀y ∈ Yk. – Second-preimage resistance: If given k ←R K and x ←R Xk, y R computationally infeasible for a PPT adversary to find a pair ...

Emerging Technologies in Knowledge Discovery and Data Mining: PAKDD 2007 International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers

... slots T selected in the Bluetooth network directly affects system throughput. In the static schedule, we determine the value of T after completing the scatternet formation. Actually, we set the value of T to be the maximum degree of the ...

Green, Pervasive, and Cloud Computing: 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings

... (PPT for short) algorithm D there exists a negligible function s(n) such that for every a e {0,1}* and every n e N, |Pr[D(X(a,n)) = 1] – Pr[D(Y(a,n)) = 1]| < s(n). 4 Server-Aided k-Out-of-n Oblivious Transfer Protocol 4.1 Server-Aided OT ...

Big Data Management and Processing

... size 50 GB, consistent with big data-processing needs. 21.7.1 SIMULATION ... cars in the parking lot may be assigned jobs and, depending on the value of i ... length Car residency distribution Values 10,080 Big Data in the Parking Lot 439.

Advances in Grid and Pervasive Computing: Second International Conference, GPC 2007, Paris, France, May 2-4, 2007, Proceedings

... movie with his mobile phone. Because of limited computing capability, the ... MP3 player for its stereo sound quality. Thus, he may connect them together ... MP3 player and the code for video processing to the ATM. As a consequence ...

Advances in Signal Processing and Intelligent Recognition Systems: Proceedings of Second International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS-2015) December 16-19, 2015, Trivandrum, India

... tracker. In: 2009 Twelfth IEEE International Workshop on Performance Evaluation of Tracking and Surveillance (PETS ... Art of Misdirection Using AES, Bi-layer Steganography and Novel King-Knight's 96 A.S. Rao et al.

Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2018, Volume 1

... mein teri - Om Shanti Om Bandaya ho - Khuda Ke Liye Galwakdi | Tarsem Jassar I hate u like love u - Delhi Belly ... Main wo chaand hoon - Teraa Surror Mann jaage - Bittoo Boss At long last | AsWeKeepSearching. 236 S. N. Daimi et al ...

Advances in Computing and Network Communications: Proceedings of CoCoNet 2020, Volume 1

... Facebook maintains photos in different forms like Cover photos, profile pictures, timeline pictures, mobile uploads, and other albums. Recent days most of the users are like ... login and logout information. In the login session, it store the ...

Advances in Distributed Computing and Machine Learning: Proceedings of ICADCML 2021

... real-time videos. The architecture of Face Mask Detector consists of the You Only Look Once (YOLO) Object Detection ... unified, real-time object detection. Int. J. Res. Appl. Sci. Eng. Technol. 8, 607–609 (2020). https://doi.org/10.22214/ ...

Cybersecurity and High-Performance Computing Environments: Integrated Innovations, Practices, and Applications

... blog/year-review-2018-product-security-riskreport. 24. A year in review: 2018 product security risk report. https://www.redhat.com/en/blog ... Jason Lee, et al. Bro intrusion detection system. Technical report, Lawrence Berkeley National ...

Intelligent Technologies: Concepts, Applications, and Future Directions, Volume 2

... ( 2018 ) 15. Minj , J. , Belchanden , L .: Path oriented test case generation ... Nanda , S.K. , Mohapatra , D.P. , Patra , M.R .: Model driven test case ... 2018 International Conference on Information Technology ( ICIT ) , pp . 50-56 ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.