Abstract Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as spamming and spreading malware, DDoS, and identity theft. We focus on the detection of the compromised machines in a network that are used for sending spam messages, which are commonly referred […]
Identify the location of fault in Web Application using Enhanced Technique
The proposed system use existing fault localization technique likeTarantula, Ochiai, and Jaccard. These techniques predict the location of a fault by computing, for each statement, the percentages of passing and failing tests that execute that statement. The enhanced source mapping is a new technique to localize faults effectively in web applications written in PHP by […]
A Survey of XML Tree Patterns
With XML becoming a ubiquitous language for data interoperability purposes in various domains, efficiently querying XML data is a critical issue. This has lead to the design of algebraic frameworks based on tree-shaped patterns akin to the tree-structured data model of XML. Tree patterns are graphic representations of queries over data trees. They are actually […]
Detecting and Tracking Vehicle in Aerial Surveillance
In this paper we present automatic vehicle detection and tracking system for aerial surveillance. In the existing frameworks they apply either region based or sliding window based of vehicle detection in aerial surveillance. These method have highly depends on the color segmentation, a lot of miss detections on rotated vehicles and high computational complexity. So […]
MCE – Mobile Commerce Explorer for mining and prediction of mobile users
Abstract In this paper, we develop pattern mining and prediction techniques that explore the correlation between the moving behavior and purchasing transactions of mobile users to explore potential M-Commerce features. The MCE framework consists of three major components: The first component is Similarity Inference Model (SIM) for measuring the similarities among stores and items. […]
Source and Sink Location Hiding for Privacy Preservation
While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. […]
CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks
The link quality variation of wireless channels has been a challenging issue in data communications until recent explicit exploration in utilizing this characteristic. The same broadcast transmission may be perceived significantly differently, and usually independently, by receivers at different geographic locations. Furthermore, even the same stationary receiver may experience drastic link quality fluctuation over time. […]
rcda recoverable concealed data aggregation for data integrity in wireless sensor networks
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. However, the base station only retrieves the aggregated result, […]
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
Feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time required to find a subset of features, the effectiveness is related […]
On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks
Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover objects of interest and thus introduce remarkable network traffic. Empirical measurement studies indicate that the peers in P2P networks have similar preferences, and have recently proposed unstructured […]
- « Previous Page
- 1
- …
- 64
- 65
- 66
- 67
- 68
- …
- 108
- Next Page »