The approach described in this research paper is based on our previous work, where the backbone of EAACK was proposed and evaluated through implementation. Extend it with the introduction of digital signature to prevent the attacker from forging acknowledgment packets. EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior report […]
Analysis of a Naive Architecture of Mobile Presence Service
Social network applications are becoming increasingly popular on mobile devices. A mobile presence service is an essential component of a social network application because it maintains each mobile user’s presence information, such as the current status (online/offline), GPS location and network address, and also updates the user’s online friends with the information continually. the system […]
Fault-Tolerant Systems in Software Reliability
Fault injection was initially developed in the context of hardware faults. Traditional fault injection techniques can emulate transient and permanent hardware faults using simple bit-flip or stuck-at models. The need for SFI arose with the emergence of software faults as a major cause of system failures, leading to the development of several SFI approaches. The […]
Hyperparameter Learning—Beam Sampling for the iHCRF
Hidden conditional random fields (HCRFs) are discriminative models that learn the joint distribution of a class label and a sequence of latent variables conditioned on a given observation sequence, with dependencies among latent variables expressed by an undirected graph. HCRFs learn not only the hidden states that discriminate one class label from all the others, […]
API Change-Rule at a Method-Header Level using a wild card pattern-matching operator
The developers often inspect program differences between two versions. A team lead reviews modifications done by her team members to check whether the intended change is implemented correctly. Questions developers ask about code changes are often of the following style. To enable developers to reason about program differences at a high level and to help […]
Cluster consensus in discrete-time networks of multi-agents with inter-cluster nonidentical inputs
The multi-agent systems have broad applications. The consensus problems of multi-agent systems have attracted increasing interests from many fields, such as physics, control engineering, and biology. In network of agents, consensus means that all agents will converge to some common state. A consensus algorithm is an interaction rule how agents update their states. The consensus […]
CloudMoV :A generic and portable mobile social TV framework
The revolutionary “reinventing the phone” campaigns initiated by Apple. Smartphones nowadays are shipped with multiple microprocessor cores and gigabyte RAMs; they possess more computation power than personal computers of a few years ago. On the other hand, the wide deployment of 3G broadband cellular infrastructures further fuels the trend. Apart from common productivity tasks like […]
Framework : Social Scalabele Adaptive Video Streaming in Mobile network Computing
The past decade, increasingly more traffic is accounted by video streaming and downloading. In video streaming services over mobile networks have become prevalent over the past few years. The video streaming is not so challenging in wired networks, mobile networks have been suffering from video traffic transmissions over scarce bandwidth of wireless links. Despite network […]
A cloud-based driving directions service in time-dependent landmark graph
A daily activity and been implemented as a key feature in many map services like Google and Bing Maps. A fast driving route saves not only the time of a driver but also energy consumption. This service is important for both end users and governments aiming to ease traffic problems and protect environment. The time […]
Policy management is protect sensitive information
THE method of policy based management is widely used to manage complex and large scale network systems. The traditional framework of policy based management consists of four core components: PDP (Policy Decision Point), PEP (Policy Enforcement Point), PAP (Policy Administration Point) and PR (Policy Repository). A well-trained policy administrator or group will specify, verify policies […]
- « Previous Page
- 1
- …
- 6
- 7
- 8
- 9
- 10
- …
- 15
- Next Page »