• No results found

network data

Credit Scoring with Ego Network Data

Credit Scoring with Ego Network Data

... Existing studies on the mathematical modeling of consumer credit risk in- clude [7] where the authors proposed a continuous time model of a borrower’s credit type. By modeling the credit type as a jump diffusion process ...

13

A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy

A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy

... social network data release method is applied directly to the back- ground of the dynamic social network, although it can meet the requirements of privacy protection policy, the time overhead will ...

11

Data citation practices in the CRAWDAD wireless network data archive

Data citation practices in the CRAWDAD wireless network data archive

... CRAWDAD network-data archive as a resource for wireless-network researchers to deposit and share their data, and for other researchers to download and use data in their ...Wireless ...

12

Network Modulation: An Algebraic Approach to Enhancing Network Data Persistence

Network Modulation: An Algebraic Approach to Enhancing Network Data Persistence

... changes, data losses, and node failures in various catastrophic or emergent ...maintaining data persistence in a scalable fashion has become critical and essential for such ...novel network ...

15

Privacy to Social Network Data

Privacy to Social Network Data

... social network data ...the data, in which node labels are both part of adversaries' background knowledge and sensitive information that has to be ...a network graph before publication, so as ...

7

Taxonomy of social network data types

Taxonomy of social network data types

... disclosed data have to be discussed separately. For disclosed data, the visibility of one’s favor always depends on the visibility of the corre- sponding item, whereas for pages, the visibility options are ...

17

Military Secured Network Data Transmission

Military Secured Network Data Transmission

... In this paper, Author propose a ensured data recovery arrange using CP-ABE for decentralized DTNs where various key powers manage their credits independently. We display how to apply the proposed framework to ...

5

The Data Analysis and Encrypting Data using Efficient Algorithm in Big Sensor Network Data

The Data Analysis and Encrypting Data using Efficient Algorithm in Big Sensor Network Data

... big data sets from sensor frameworks. Snappy acknowledgment of data errors in big data with cloud stays testing particularly, how to use the calculation compel of cloud to quickly find and discover ...

5

SiGNet: A signaling network data simulator to enable signaling network inference.

SiGNet: A signaling network data simulator to enable signaling network inference.

... these data and achieved a Pearson correlation with the real data of up to ...The network depicted in Fig 3A shows the interactions between EGFR and a number of downstream proteins, as described in ...

13

A Membrane Turing Machine

A Membrane Turing Machine

... (input data object / communication network data), this assumption is applied to each membrane (machine) in the ...input data so its application phase can perform its process over those ...

6

Data Routing for in-Network Aggregation in WSN

Data Routing for in-Network Aggregation in WSN

... are data-driven networks that usually produce a large amount of information that needs to be routed, often in a multi- hop fashion, toward a sink node, which works as a gateway to a monitoring ...the data ...

8

Research on real time network data mining technology for big data

Research on real time network data mining technology for big data

... computer network information technology, all kinds of large websites are constantly established and updated in real ...the network so- ciety, large-scale websites are information browsing and data ...

6

Vol 7, No 12 (2017)

Vol 7, No 12 (2017)

... infrastructure. Data deduplication is the process by which a storage provider only stores a single copy of a file owned by several of its ...the network bandwidth and storage costs. Indeed, data ...

5

Transmission A Data Through Ad-Hoc Network With Demand Routing Network

Transmission A Data Through Ad-Hoc Network With Demand Routing Network

... problems. Data can send one to another usinvg On Demand (Reactive) Routing with each network ...another network can send a data to the expected ...

5

Towards evaluation of inferred gene network

Towards evaluation of inferred gene network

... Gene network refers to a set of molecular components such as genes, proteins and other molecules, and interactions between them that collectively carry out some cellular ...Gene network provides an overview ...

6

Efficient Data Aggregation for Enhanced Network Lifetime in Wireless Sensor Network

Efficient Data Aggregation for Enhanced Network Lifetime in Wireless Sensor Network

... networks, data aggregation acknowledge a crucial part in diminishing centrality ...secure data aggregation because of the open and upsetting condition passed ...secure data gathering. Regardless, ...

7

Network Failure Detection and Diagnosis by Analyzing Syslog and SNS Data: Applying Big Data Analysis to Network Operations

Network Failure Detection and Diagnosis by Analyzing Syslog and SNS Data: Applying Big Data Analysis to Network Operations

... Twitter has a capacity to join the client's area by GPS (Global Positioning System) information, however most clients pick not to select into this capacity. Consequently, we have to gauge the area of Twitter clients who ...

5

Design of low power network on chip using data encoding techniques

Design of low power network on chip using data encoding techniques

... of Network On Chip’s (NoC’s) structure makes a fitting replacement for System On Chip (SoC) design in designs incorporating large number of processing ...the Network Interface (NI) before they are injected ...

8

Structure less Efficient Data Aggregation and Data Integrity in Sensor Network

Structure less Efficient Data Aggregation and Data Integrity in Sensor Network

... efficient data aggregation and data integrity in sensor ...sensing data generated by all sensors even if these data have been aggregated by cluster procedures: Setup, Intracluster Encrypt, and ...

5

Provenance network analytics: an approach to data analytics using data provenance

Provenance network analytics: an approach to data analytics using data provenance

... the network met- rics of provenance graphs to explore and automate data ...principled data analytics method for analysing data and applications based on their provenance ...the data ...

28

Show all 10000 documents...

Related subjects