Results 121 to 130 of about 1,421,530 (167)
Some of the next articles are maybe not open access.

Search engine optimization: The long-term strategy of keyword choice

Journal of business research, 2022
The literature on supply strategies in keyword auctions has suggested a pattern of convergence towards a long-term equilibrium expenditure path as approximate Nash equilibrium.
Anett Erdmann   +2 more
semanticscholar   +1 more source

No Keyword is an Island: In search of covert associations

2021
This paper describes how corpus-assisted discourse analysis based on keyword (KW) identification and interpretation can benefit from employing Market basket analysis (MBA) after KW extraction. MBA is a data mining technique used originally in marketing that can reveal consistent associations between items in a shopping cart, but also between keywords ...
Cvr��ek, V��clav   +1 more
openaire   +1 more source

NOVEL: NO-VowEL Technique to Search Fuzzy Keyword

2017 18th IEEE International Conference on Mobile Data Management (MDM), 2017
Information retrieval techniques play vital role in the era of information technology. Inverted index is one of the technique to retrieve the information/data related with certain keyword. This technique gives faster results to retrieve relevant document from billions of documents, which contains specified keyword.
Amol Jaikar, Seo-Young Noh
openaire   +1 more source

Authenticated Keyword Search in Scalable Hybrid-Storage Blockchains

IEEE International Conference on Data Engineering, 2021
Blockchain has emerged as a promising solution for secure data storage and retrieval for decentralized applications. To scale blockchain systems, a prevailing approach is to employ a hybrid storage model, where only small meta-data are stored on-chain ...
Ce Zhang   +4 more
semanticscholar   +1 more source

Detecting research topic trends by author-defined keyword frequency

Information Processing & Management, 2021
Detecting research trends helps researchers and decision makers to promptly identify and analyze research topics. However, due to citation and publication delay, previous studies on trend analysis are more likely to identify ex-post trends. In this study,
Wei Lu   +5 more
semanticscholar   +1 more source

Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud

IEEE Transactions on Dependable and Secure Computing, 2021
E-Healthcare systems are increasingly popular due to the introduction of wearable healthcare devices and sensors. Personal health records (PHRs) are collected by these devices and stored in a remote cloud. Due to privacy concern, these records should not
Haijiang Wang   +5 more
semanticscholar   +1 more source

Secure Keyword Search and Data Sharing Mechanism for Cloud Computing

IEEE Transactions on Dependable and Secure Computing, 2020
The emergence of cloud infrastructure has significantly reduced the costs of hardware and software resources in computing infrastructure. To ensure security, the data is usually encrypted before it's outsourced to the cloud.
Chunpeng Ge   +5 more
semanticscholar   +1 more source

Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks

IEEE Transactions on Services Computing, 2021
Searchable public key encryption (SPKE) is a useful public key cryptographic primitive that allows a user to perform keyword searches over publicly encrypted messages on an untrusted storage server while guaranteeing the privacy of the original messages ...
Yang Lu, Jiguo Li, Yicheng Zhang
semanticscholar   +1 more source

Public-key authenticated encryption with keyword search revisited: Security model and constructions

Information Sciences, 2020
In cloud era, it is necessary to store sensitive data in an encrypted form. This arises the interesting and challenging problem of searching on encrypted data.
Baodong Qin   +4 more
semanticscholar   +1 more source

5G based Blockchain network for authentic and ethical keyword search engine

IET Communications, 2021
The evolution of 4G telecommunication propagated various resource-crunched clients to experience rate-effective resources at ease. However, it extends its underlying centralised architecture, which arouses various challenges correlated with network data ...
P. M.   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy