Abstract:
The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or more update operations. After sequential steps of updates, a second set of data records with actual values are obtained. After working of this data for a period of time the owner of the data again begins updating the actual values associated with the subset of the second set of data records into random values. When all the data records are updated to random values the owner of the data successfully ends the Service Level Agreement period.
Abstract:
The technique relates to methods and devices for generating minimized test suites using a genetic algorithm. The technology involves generating a plurality of test cases corresponding to a plurality of test paths associated with an activity diagram of a software requirement specification thereafter obtaining a plurality of test coverage criteria for test suite minimization and finally determining a subset of the plurality of test cases which satisfies the plurality of test coverage criteria by using a multi objective optimization technique. The technology also involves prioritizing the subset of the plurality of test cases based on node defect probability wherein the node defect probability is determined by using a bug prediction technique based on previous bug history of the node thereafter the priorities are dynamically re-ordered during test execution.
Abstract:
A method and system for a multi-user searchable encryption system over ordered keywords is disclosed. The system includes a key generation server which issues a primary key to a user terminal device and a secondary key to a proxy server. A trapdoor is sent by the user terminal and received by the proxy server. The trapdoor is encrypted at the proxy server. The proxy server receives cypher text from the user terminal and sends the cypher text to the database server. A search keyword inputted by the user at the user terminal is used to perform a lookup in encrypted data.
Abstract:
A method disclosed herein can include receiving content for communication to one or more network clients from a content provider, where the content includes at least a web page. A content request is received from a selected client of the one or more network clients. In response to receiving the content request, the web page is prepared for communication to the selected client. A web page identifier associated with the prepared web page is generated. The web page and the web page identifier are forwarded to the selected client. A plurality of web page identifiers associated with respective web pages within the received content can be stored. The web page identifier can be obtained from among the stored web page identifiers.
Abstract:
The technique relates to a system and method for correcting geometric distortions in videos and images. To correct the one or more geometric distortions in videos, the frames of the original and distorted video are mapped at the beginning and then the features associated with the mapped frames which are insensitive to geometric distortions are identified. In case of correcting geometric distortions in images, frame mapping is not required and thus the process starts from identifying the features insensitive to geometric distortions in the original image and distorted image. Then, the geometric distortion parameters are identified from the mapped features. After that, a frame level and video level average distortion of the geometric distortion parameters are determined. Finally, the geometric distortions are corrected based on the frame level and video level average distortion value.
Abstract:
A method, non-transitory computer readable medium, and apparatus that obtains a version history for a plurality of source code files associated with the computer program. At least one defect probability value is generated for each of the plurality of source code files using at least one metric and the obtained version history. One or more of the plurality of source code files having a higher risk of including one or more defects than one or more other of the plurality of source code files are identified based on the generated defect probability values. Information regarding each of the one or more identified source code files is output.
Abstract:
This technology relates to a device and method for determining co-locatability of a plurality of virtual machines on one or more physical infrastructures. The plurality of virtual machines hosts a plurality of workloads. This involves identifying workloads which have high variability from the time series data and determining the workload capacity threshold of the identified workloads. Thereafter, the candidate workloads are selected among the identified workloads to colocate on a virtual machine based on the workload variability. After that, the total capacity required by each candidate workload pair to meet the service requirement is determined based on the workload capacity threshold. Then, an optimal sharing point of each workload of the pair with respect to the other workload of the pair is identified. Further, percentage compatibility of each workload pair is determined and finally, the candidate workloads are colocated based on the optimal sharing point and percentage compatibility.
Abstract:
Techniques for testing one or more applications running on a handheld device include: receiving, by a tester system, an error state corresponding to the one or more applications; retrieving, by the tester system, one or more tests script parameters corresponding to the error state from a database, wherein the one or more test script parameters corresponding to the error state are stored in the database; providing, by the tester system, the one or more test script parameters to an input subsystem, wherein the input subsystem is connected to the handheld device; notifying a user to provide one or more inputs corresponding to the error state, wherein the one or more test script parameters are not stored in the database; receiving, by the tester system, the one or more inputs from the user; and providing, by the tester system, the one or more inputs to the input subsystem.
Abstract:
The present invention provides a method and system for distributed probabilistic matrix factorization. In accordance with a disclosed embodiment, the method may include partitioning a sparse matrix into a first set of blocks on a distributed computer cluster, whereby a dimension of each block is MB rows and NB columns. Further, the method shall include initializing a plurality of matrices including first mean matrix Ū, a first variance matrix Ũ, a first prior variance matrix ŨP, a second mean matrix V, a second variance matrix {tilde over (V)}, and a second prior variance matrix {tilde over (V)}P, by a set of values from a probability distribution function. The plurality of matrices can be partitioned into a set of blocks on the distributed computer cluster, whereby each block can be of a shorter dimension K, and the plurality of matrices can be updated iteratively until a cost function of the sparse matrix converges.
Abstract:
The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.