The approach described in this research paper is based on our previous work, where the backbone of EAACK was proposed and evaluated through implementation. Extend it with the introduction of digital signature to prevent the attacker from forging acknowledgment packets. EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior report […]
SOCIAL NETWORK ANALYSIS BASED MOBILE NODE GROUPING
The sporadically deployed BSs/APs to the mobile nodes. To reduce the delay of packet delivery to a mobile node which is out of the transmission range of a BS (e.g., connectivity lost due to high mobility), a cooperative packet delivery scheme based on carry-and forward mechanism is used . For such applications, are provided through […]
Analysis of a Naive Architecture of Mobile Presence Service
Social network applications are becoming increasingly popular on mobile devices. A mobile presence service is an essential component of a social network application because it maintains each mobile user’s presence information, such as the current status (online/offline), GPS location and network address, and also updates the user’s online friends with the information continually. the system […]
Fault-Tolerant Systems in Software Reliability
Fault injection was initially developed in the context of hardware faults. Traditional fault injection techniques can emulate transient and permanent hardware faults using simple bit-flip or stuck-at models. The need for SFI arose with the emergence of software faults as a major cause of system failures, leading to the development of several SFI approaches. The […]
CLASSIFICATION OF ANALYSIS- CLUSTERING PATTERN DISCRIMINATIVE ALGORITHMS
A natural environment, the high dimensional measurement signals, lying in the F-dimensional measurement space, usually represent patterns residing in a much lower, D- dimensional subspace embedded in the ambient measurement space. Subclass discriminant analysis (MSDA) and restricted Gaussian model is first presented, and then two further discriminant analysis (DA) methods, fractional step MSDA (FSMSDA) and […]
Good rate of convergence with a guaranteed empirical risk minimization
The input data are not generated by an external source. The points at which the unknown function is observed need to be chosen by some specific algorithm. This last condition can be found in applications, among others, from neural networks, robotics, optimal control, and statistics. The case where kernel-based local models are employed for the […]
Hyperparameter Learning—Beam Sampling for the iHCRF
Hidden conditional random fields (HCRFs) are discriminative models that learn the joint distribution of a class label and a sequence of latent variables conditioned on a given observation sequence, with dependencies among latent variables expressed by an undirected graph. HCRFs learn not only the hidden states that discriminate one class label from all the others, […]
API Change-Rule at a Method-Header Level using a wild card pattern-matching operator
The developers often inspect program differences between two versions. A team lead reviews modifications done by her team members to check whether the intended change is implemented correctly. Questions developers ask about code changes are often of the following style. To enable developers to reason about program differences at a high level and to help […]
FoCUS Modules of Index And Thread URL Detection
Internet forums are important platforms where users can request and exchange information with thers. The TripAdvisor Travel Board is a place where people can ask and share travel tips. Due to the richness of information in forums, researchers are increasingly interested in mining knowledge from them. To harvest knowledge from forums, their contents have to […]
The few approaches concerned with goal operationalization are the NFR framework
It is concerned with the elicitation of stake-holders goals, the elaboration of these goals into requirements on the software behavior, and the assignment of responsibilities for these requirements to agents . Inadequacy in the execution of any of these RE subtasks inevitably leads to development problems which are often difficult and costly to repair. This […]
- « Previous Page
- 1
- …
- 45
- 46
- 47
- 48
- 49
- …
- 108
- Next Page »