Human-centric Computing and Information Sciences

http://link.springer.com/journal/13673

List of Papers (Total 158)

Embedding edit distance to enable private keyword search

Background Our work is focused on fuzzy keyword search over encrypted data in Cloud Computing. Methods We adapt results on private identification schemes by Bringer et al. to this new context. We here exploit a classical embedding of the edit distance into the Hamming distance. Results Our way of doing enables some flexibility on the tolerated edit distance when looking for close ...

Organization and exploration of heterogeneous personal data collected in daily life

This paper describes a study on the organization and the exploration of heterogeneous personal data that are collected from mobile devices and web services in daily use. Although large amounts of personal data can be collected, it is not easy to find effective methods of reusing these data. With regard to collecting personal data, most lifelog research has focused on the capture of ...

A survey of black hole attacks in wireless mobile ad hoc networks

The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we survey the ...

A human-centric integrated approach to web information search and sharing

In this paper we argue a user has to be in the center of information seeking task, as in any other task where the user is involved. In addition, an essential part of user-centrism is considering a user not only in his/her individual scope, but expanding it to the user's community participation quintessence. Through our research we make an endeavor to develop a holistic approach ...

Quality of service provision in mobile multimedia - a survey

The prevalence of multimedia applications has drastically increased the amount of multimedia data. With the drop of the hardware cost, more and more mobile devices with higher capacities are now used. The widely deployed wireless LAN and broadband wireless networks provide the ubiquitous network access for multimedia applications. Provision of Quality of Service (QoS) is ...

Trustworthy Group Making Algorithm in Distributed Systems

Information systems are being shifted to scalable architectures like Cloud and peer-to-peer (P2P) models. In this paper, we consider the P2P model as a fully distributed, scalable system different from centralized coordinated systems in Cloud and Grid systems. A P2P system is composed of peer processes (peers). Here, applications are realized by activities of peers and cooperations ...

Application of a MANET Testbed for horizontal and vertical scenarios: performance evaluation using delay and jitter metrics

Mobile ad hoc networks are attracting attention for their potential use in several fields such as collaborative computing and communications in indoor areas. Mobility and the absence of any fixed infrastructure make MANETs very attractive for mobility and rescue operations and time-critical applications. Considering mobility of the terminals, routing is a key process for operation ...

Integrating body language movements in augmented reality learning environment

Due to excessive use of computer and other low activity learning systems in many schools the physical health status of young students is deteriorating at an alarming rate throughout the world and more seriously in Taiwan upon recent national survey. We address this growing global problem with student learning process in mind in this study we examine making a better use of ...