Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ […]
Efficiently achieving data staging and caching in a cloud system
In this paper, we study this data staging problem by leveraging the dynamic programming (DP) techniques to optimally migrate, replicate, and cache the shared data items in cloud systems with or without some practical resource constraints in an efficient way while minimizing the monetary cost for transmitting and caching the data items.To this end, we […]
Optimal Resource Allocation in Self Organizing Clouds
By leveraging virtual machine (VM) technology which provides performance and fault isolation, cloud resources can be provisioned on demand in a fine grained, multiplexed manner rather than in monolithic pieces. By integrating volunteer computing into cloud architectures, we envision a gigantic self-organizing cloud (SOC) being formed to reap the huge potential of untapped commodity computing […]
CLEAN-SLATE ROUTING IN SENSOR NETWORKS
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ […]
Towards Privacy-Preserving Location proof Updating System
Today’s location-sensitive service relies on user’s mobile device to determine the current location. This allows malicioususers to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A Privacy -Preserving Location proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs […]
Towards Statistically Strong Source Anonymity for Sensor Networks
In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is , unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless […]
Optimal Geographical Forwarding using Relay Selection in Wireless Sensor Networks with Sleep-Wake Cycling Nodes
Our work is motivated by geographical forwarding of sporadic alarm packets to a base station in a wireless sensor network (WSN), where the nodes are sleep-wake cycling periodically and asynchronously. We seek to develop local forwarding algorithms that can be tuned so as to tradeoff the end-to-end delay against a total cost, such as the […]
A new Distributed Cooperation and Diversity Combining framework in hybrid wireless networks
Our focus is on heterogeneous networks with devices equipped with two types of radio frequency (RF) interfaces: short-range high-rate interface (e.g., IEEE802.11), and a long-range low-rate interface (e.g., cellular) communicating over urban Rayleigh fading channels. Within this framework, we propose and evaluate a set of distributed cooperation techniques operating at different hierarchical levels with resource […]
Improving Probabilistic Route Discovery in Mobile Ad Hoc Networks
Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to nfrequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data propagation mechanism, where a mobile node blindly rebroadcasts the […]
Resource allocation for multicast services in multicarrier wireless communications
Multicast/broadcast is regarded as an efficient technique for wireless cellular networks to transmit a large volume of common data to multiple mobile users simultaneously. To pledge the quality of service for each mobile user in such single-hop multicasting, the base-station transmitter usually adapts its data rate to the worst channel condition among all users in […]
- « Previous Page
- 1
- …
- 57
- 58
- 59
- 60
- 61
- …
- 108
- Next Page »