Showing 1 - 2 results of 2 for search '"general store"', query time: 0.03s Refine Results
  1. 1

    Multi-attribute aware scheduling for inter-datacenter bulk transfers by Yang-yang LI, Hong-bo WANG, Peng ZHANG, Jian-kang DONG, Shi-duan CHENG

    Published 2012-09-01
    “…A multi-attribute decision making method to schedule inter-datacenter bulk data was proposed.First,hierarchical analysis was used to analyze the dominant relationship among attributes.Based on the relative weights of attributes which were calculated via information entropy,the evaluation to each intermediate data center was provided.Then the multi-attribute aware scheduling problem was modeled on a time expanded graph and formulated as a minimal cost flow problem.Finally,the scheme with general store-and-forward mechanism and single attribute based approach under several different simulation settings was compared.The results demonstrate that our strategy can take multiple attributes into consideration,and can find the bulk transfer route with the best integrated evaluation.…”
    Get full text
    Article
  2. 2

    Method of privacy protection based on multiple edge servers in personalized search by Qiang ZHANG, Guojun WANG, Shaobo ZHANG

    Published 2019-02-01
    “…In the plaintext environment,users' personalized search results can be obtained through users' interest model and query keywords.However,it may possibly result in the disclosure of sensitive data and privacy,which prevents using sensitive data in cloud search.Therefore,data is generally stored in the form of ciphertext in the cloud server.In the process of cloud search service,users intend to quickly obtain the desired search results from the vast amount of ciphertext.In order to solve the problem,it was proposed that a method of privacy protection based on multiple edge servers in personalized search shall be used.By introducing multiple edge servers and cutting the index as well as the query matrix,the computing relevance scores of partial query and partial file index are achieved on the edge server.The cloud server only needs to get the relevance score on the edge server and make a simple processing that can return to the most relevant Top K files by user query,so as to make it particularly suitable for a large number of users in the massive personalized ciphertext search.Security analysis and experimental results show that this method can effectively protect users’ privacy and data confidentiality.In addition,it can guarantee high efficiency in search to provide better personalized search experience.…”
    Get full text
    Article