Network Our research aims at providing a scalable, reliable, and robust approach for web service discovery. An overview of web service discovery. Service-oriented Computing (SOC) is emerging as a new paradigm for developing distributed applications. Service discovery, among the most fundamental elements of SOC, is critical to the success of SOC as a whole. Traditional […]
The type system is parameterized by an arbitrary lattice of security levels
A survey on language-based information-flow security contains an overview of the area. Most related to ours is work on tracking information flow in object-oriented languages and on information-flow controls in the presence of exceptions. Language-based concepts and techniques are becoming increasingly popular in the context of security , because they provide an appropriate level of […]
The technique for Fuzzy Grid Prediction
This paper is motivated by our interest in a localization technique for a mobile sensor network, deployed in a harsh environment and a set of interesting/surprising results obtained from simulations of two state-of-the-art localization techniques for mobile sensor networks, namely MCL and MSL. Range-based localization methods require an estimate of the distance or angle between […]
Scalable Video Coding Technique in Mobile Networks
In this paper, we discussed our proposal of an adaptive mobile video streaming and sharing framework, called AMES-Cloud, which efficiently stores videos in the clouds (VC), and utilizes cloud computing to construct private agent (subVC) for each mobile user to try to offer “non-terminating” video streaming adapting to the fluctuation of link quality based on […]
WIRELESS NETWORKS TO ACHIEVE VMISO LINKS
The wireless channel is impaired by random fluctuations in signal level across space, time, and frequency dimensions known as fading. This signal fluctuation (also called diversity) can be exploited by the use of multiple transmissions/ receptions distributed across time or space with appropriate encoding to enhance and stabilize the signal level at the receiver. Such […]
Pixel Prediction Based on Image Inpainting
Reversible steganography, also called reversible data hiding, has been studied extensively in recent years,especially for digital images . The property of reversibility means that the original form of the image, before the secretbits were embedded, can be recovered completely after the embedded bits are extracted. Reversible data hiding can be used for medical, military, and […]
MOBILE SENSOR NAVIGATION STRATEGY
A navigator in this case aims to control the mobile sensor to get close to the moving target from any initial position. Since the target maneuvers are not known a priori to the controller, solving the problem requires a real-time strategy. The joint problem of mobile sensor navigation and mobile target tracking based on a […]
VM multiplexing resource allocation scheme to manage decentralized resources
The design of our dynamic optimal proportional-share resource allocation method, which leverages the proportional share model.The key idea to redistribute available resources among running tasks dynamically, such that these tasks could use up the maximum capacity of each resource in a node (i.e., up to cðpsÞ), while each task’s execution time can be further minimized […]
Anonymization by sequential clustering for privacy-preservation in social networks
The problem of privacy-preservation in social networks.The distributed setting in which the network data is split between several data holders. Networks are structures that describe a set of entities and the relations between them. A social network, for example, provides information on individuals in some population and the links between them, which may describe relations […]
Data-intensive wireless Sensor networks
WSNs have been deployed in a variety of data intensive applications including micro-climate and habitat monitoring, precision agriculture, and audio/video surveillance. A moderate-size WSN can gather up to 1 Gb/year from a biological habitat . Due to the limited storage capacity of sensor nodes, most data must be transmitted to the base station for archiving […]
- « Previous Page
- 1
- …
- 43
- 44
- 45
- 46
- 47
- …
- 108
- Next Page »