Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
As IC densities are increasing, cluster-based FPGA architectures are becoming the architecture of choice for major FPGA manufacturers. A cluster-based architecture is one in which...
This paper proposes a three-stage analysis of web navigation that yields search results being relevant to the user’s interests and preferences. The approach is inspired by ant fo...
This paper presents a scalable and adaptive decentralized metadata lookup scheme for ultra large-scale file systems (≥ Petabytes or even Exabytes). Our scheme logically organiz...
Yu Hua, Yifeng Zhu, Hong Jiang, Dan Feng, Lei Tian
An ’Internet Protocol’ (IP) network established over Bluetooth affords higher practical throughput compared to the ‘Synchronous Connection Oriented’ (SCO) physical link al...