Secured Diversified Data set Selection From Dynamic Data
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Once the data is created, the data that it contains doesn’t change is known as static data (ex: newspaper).Where as the data can be change and update in the dynamic data (ex: website). A lot of information available online creates the need for developing methods towards selecting and presenting to users representative result sets. Diversification has recently attracted considerable attention as a means of increasing user satisfaction in recommender systems, as well as in web and database search. In this paper on the problem of selecting the k-most diverse items from a result set. Whereas previous research has mainly considered the static version of the problem, in this paper, exploit the dynamic case in which the result set changes over time, as for example, in the case of notification services. The proposed approach is based on cover trees and supports dynamic item insertion and deletion and provides theoretical bounds that characterize the quality of cover tree solution with respect to the optimal one. Since results are often associated with a relevance score, to extend the proposed approach to account for relevance.
Authors and Affiliations
K. Suresh, Ch. Nanda Krishna
Extensions of The Crypto Graphic Methods To Provide Efficient Routing Of Encrypted Events
Content-based pub/sub is the alternative that gives the most communicative subscription model, where subscriptions describe restrictions on the message content. Its persuasiveness and asynchronous nature is above all...
Dynamic Authentication over Graphical Passwords using Visual Cryptography
CAPTCHA is a test build by computer programs which human can pass but computer programs cannot pass CAPTCHA as graphical passwords (CaRP) are a graphical password scheme used for a user access authentication. It is m...
Faults Identification by Passing Test Packets Through Efficient Tool In Network
ATPG comprehends router designs and produces a device autonomous model. The reproduction is utilized to deliver a base arrangement of test packets to negligibly put into impact each connection in the network or maxim...
Effective R-cube Algorithm for Deriving Relevant Information on the Web
The analysis of user search goals can be very useful in improving search engine relevance and user experience. A novel approach to infer user search goals by examines search engine query logs. A framework to determin...
Authentication Token as SSO Devices
Authentication is a process by which a person verifies that someone is who he claims he is. There are many ways of authentication as user login authentication, one-way authentication of communicating entities and two...