RAPID development of Mobile Ad Hoc Networks (MANETs) has stimulated numerous wireless applications that can be used in a wide number of areas such as commerce, emergency services, military, education, and entertainment. MANETs feature self-organizing and independent infrastructures. Through traffic analysis, enemies may intercept transmitted packets, track our soldiers (i.e., nodes), attack the commander nodes, […]
Context-Dependent Logo Matching and Recognition CDS Logo Detection and Recognition
This paper presents a new method for logo detection and recognition based on “Context- Dependent Similarity” (CDS). It directly has as a feature the spatial context of local features. The CDS function is defined as the fixed-point of three terms: (i) an energy function which balances a fidelity term; (ii) a context criterion; (iii) an […]
Privacy Preserving Data Mining in Horizontally Distributed Databases
The problem of secure mining of association rules in horizontally partitioned databases. One of the main ingredients in our proposed protocol is a novel secure multi-party protocol for computing the union (or intersection) of private subsets that each of the interacting players hold. Another ingredient is a protocol that tests the inclusion of an element […]
Sq: Sequential Clustering for Privacy preserving data anonymization
This paper presents sequential clustering algorithms for anonymizing social networks. Those algorithms produce anonymizations by means of clustering with better utility than those achieved by existing algorithms. We devised a secure distributed version of our algorithms for the case in which the network data is split between several players. We focused on the scenario in […]
VM Resource Allocation Isolation Technology in Cloud System
CLOUD computing has emerged as a compelling paradigm for the deployment of ease-of-use virtual environment on the Internet. One typical feature of clouds is its pool of easily accessible virtualized resources (such as hardware, platform or services) that can be dynamically reconfigured to adjust to a variable load (scale). Cloud systems usually do not provision […]
Similarity relevance scheme for protecting data in cloud computing
Cloud computing, a critical pattern for advanced data service, has became a necessary feasibility for data users to outsource data. Controversies on privacy, It is incessantly presented as outsourcing of sensitive information including emails, health history and personal photos is explosively expanding. Traditional SSE schemes enable users to securely retrieve the cipher text, but these […]
TPA Public audit-ability for secure Cloud Computing
CLOUD computing has been envisioned as the next generation information technology (IT) architecture for enterprises, due to its long list of unprecedented advantages in the IT history: on-demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk storing data remotely to the cloud in a flexible on-demand […]
Predictive ACKs: Reducing Latency and Operational Cost in Cloud Computing
PACK (Predictive ACKs), traffic redundancy elimination (TRE) system, designed for cloud computing customers. In this paper, we present a novel receiver-based end-to-end TRE solution that relies on the power of predictions to eliminate redundant traffic between the cloud and its end-users. In this solution, each receiver observes the incoming stream and tries to match its […]
M/M/m queuing model for Profit maximization in cloud computing
This paper focuses the problem of optimal multi-server configuration for profit maximization in a cloud computing environment. This approach is to treat a multi-server system as an M/M/m queuing model, such that our optimization problem can be formulated and solved analytically. We consider two server speed and power consumption models, namely, the idle-speed model and […]
Skewness Minimization: Improving utilization of Cloud servers
In this paper, we present the design and implementation of an automated resource management system that achieves a good balance between the two goals i.e. Overload avoidance and Green computing. We develop a resource allocation system that can avoid overload in the system effectively while minimizing the number of servers used. . We introduce the […]
- « Previous Page
- 1
- …
- 51
- 52
- 53
- 54
- 55
- …
- 108
- Next Page »