Page 28 of
Abstract Background Once multi-relational approach has emerged as an alternative for analyzing structured data such as relational databases, since they allow applying data mining in multiple tables …
Carlos Roberto Valêncio, Fernando Takeshi Oyama, Paulo Scarpelini Neto, Angelo Cesar Colombini, Adriano Mauro Cansian, Rogéria Cristiane Gratão de Souza & Pedro Luiz Pizzigatti Corrêa
Human-centric Computing and Information Sciences 2012 2:04Abstract In an underwater environment there can be various applications relating to the naval monitoring of an area and information gathering through the sensor nodes or underwater vehicles. The info…
Sanjay K Dhurandher, Mohammad S Obaidat & Megha Gupta
Human-centric Computing and Information Sciences 2012 2:03Abstract Background Our work is focused on fuzzy keyword search over encrypted data in Cloud Computing. Methods We adapt results on private identification schemes by Bringer et al. to this new c…
Julien Bringer & Hervé Chabanne
Human-centric Computing and Information Sciences 2012 2:02Abstract This paper describes a study on the organization and the exploration of heterogeneous personal data that are collected from mobile devices and web services in daily use. Although large amoun…
Teruhiko Teraoka
Human-centric Computing and Information Sciences 2012 2:01Abstract Information systems are being shifted to scalable architectures like Cloud and peer-to-peer (P2P) models. In this paper, we consider the P2P model as a fully distributed, scalable system dif…
Ailixier Aikebaier, Tomoya Enokido & Makoto Takizawa
Human-centric Computing and Information Sciences 2011 1:06Abstract The prevalence of multimedia applications has drastically increased the amount of multimedia data. With the drop of the hardware cost, more and more mobile devices with higher capacities are…
Hongli Luo & Mei-Ling Shyu
Human-centric Computing and Information Sciences 2011 1:05Abstract The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the rout…
Fan-Hsun Tseng, Li-Der Chou & Han-Chieh Chao
Human-centric Computing and Information Sciences 2011 1:04Abstract Mobile ad hoc networks are attracting attention for their potential use in several fields such as collaborative computing and communications in indoor areas. Mobility and the absence of any …
Masahiro Hiyama, Elis Kulla, Tetsuya Oda, Makoto Ikeda & Leonard Barolli
Human-centric Computing and Information Sciences 2011 1:03Abstract In this paper we argue a user has to be in the center of information seeking task, as in any other task where the user is involved. In addition, an essential part of user-centrism is conside…
Roman Y Shtykh & Qun Jin
Human-centric Computing and Information Sciences 2011 1:02Abstract Due to excessive use of computer and other low activity learning systems in many schools the physical health status of young students is deteriorating at an alarming rate throughout the worl…
Kuei-Fang Hsiao & Habib F Rashvand
Human-centric Computing and Information Sciences 2011 1:01