RECENT emergence of data enabled mobile devices and wireless-enabled data applications have fostered new content dissemination models in today’s mobile ecosystem. A list of such devices includes Apple’s iPhone, Google’s Android, Amazon’s Kindle, and electronic book readers from other vendors. The array of data applications includes electronic book and magazine readers and mobile phone Apps. […]
A Coalitional Game Approach Hybrid Wireless Networks in Cooperative packet Delivery
WIRELESS communications and networking technology is the key to supporting a variety of applications such as the safety and emergency notification and infotainment applications a coalitional game framework for carry-and-forward-based cooperative packet delivery to mobile nodes in a hybrid wireless network. The mobile nodes are rational to form coalitions to maximize their individual payoffs. A […]
Secure Routing Protocol Using MANET’S
RAPID development of Mobile Ad Hoc Networks (MANETs) has stimulated numerous wireless applications that can be used in a wide number of areas such as commerce, emergency services, military, education, and entertainment. MANETs feature self-organizing and independent infrastructures. Through traffic analysis, enemies may intercept transmitted packets, track our soldiers (i.e., nodes), attack the commander nodes, […]
Context-Dependent Logo Matching and Recognition CDS Logo Detection and Recognition
This paper presents a new method for logo detection and recognition based on “Context- Dependent Similarity” (CDS). It directly has as a feature the spatial context of local features. The CDS function is defined as the fixed-point of three terms: (i) an energy function which balances a fidelity term; (ii) a context criterion; (iii) an […]
Sq: Sequential Clustering for Privacy preserving data anonymization
This paper presents sequential clustering algorithms for anonymizing social networks. Those algorithms produce anonymizations by means of clustering with better utility than those achieved by existing algorithms. We devised a secure distributed version of our algorithms for the case in which the network data is split between several players. We focused on the scenario in […]
VM Resource Allocation Isolation Technology in Cloud System
CLOUD computing has emerged as a compelling paradigm for the deployment of ease-of-use virtual environment on the Internet. One typical feature of clouds is its pool of easily accessible virtualized resources (such as hardware, platform or services) that can be dynamically reconfigured to adjust to a variable load (scale). Cloud systems usually do not provision […]
Similarity relevance scheme for protecting data in cloud computing
Cloud computing, a critical pattern for advanced data service, has became a necessary feasibility for data users to outsource data. Controversies on privacy, It is incessantly presented as outsourcing of sensitive information including emails, health history and personal photos is explosively expanding. Traditional SSE schemes enable users to securely retrieve the cipher text, but these […]
TPA Public audit-ability for secure Cloud Computing
CLOUD computing has been envisioned as the next generation information technology (IT) architecture for enterprises, due to its long list of unprecedented advantages in the IT history: on-demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk storing data remotely to the cloud in a flexible on-demand […]
Predictive ACKs: Reducing Latency and Operational Cost in Cloud Computing
PACK (Predictive ACKs), traffic redundancy elimination (TRE) system, designed for cloud computing customers. In this paper, we present a novel receiver-based end-to-end TRE solution that relies on the power of predictions to eliminate redundant traffic between the cloud and its end-users. In this solution, each receiver observes the incoming stream and tries to match its […]
M/M/m queuing model for Profit maximization in cloud computing
This paper focuses the problem of optimal multi-server configuration for profit maximization in a cloud computing environment. This approach is to treat a multi-server system as an M/M/m queuing model, such that our optimization problem can be formulated and solved analytically. We consider two server speed and power consumption models, namely, the idle-speed model and […]
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- …
- 9
- Next Page »