Wireless sensor networks have found rapidly growing applications in areas such as automated data collection, surveillance, and environmental monitoring. One important use of sensor networks is the tracking of a mobile target (point source) by the network. Mobile target tracking has a number of practical applications, including robotic navigation, search-rescue, wildlife monitoring, and autonomous surveillance. […]
VM-multiplexing resource allocation in Self-Organizing Clouds Computing
CLOUD computing has emerged as a compelling paradigm for deploying distributed services. Resource allocation problem in cloud systems emphasizes how to harness the multi attribute resources by multiplexing operating systems. The virtual machine (VM) technology, able to multiplex several operating systems on the same hardware and allow task execution over its VM substrates without performance […]
Context-Dependent Logo Matching and Recognition CDS Logo Detection and Recognition
This paper presents a new method for logo detection and recognition based on “Context- Dependent Similarity” (CDS). It directly has as a feature the spatial context of local features. The CDS function is defined as the fixed-point of three terms: (i) an energy function which balances a fidelity term; (ii) a context criterion; (iii) an […]
VM Resource Allocation Isolation Technology in Cloud System
CLOUD computing has emerged as a compelling paradigm for the deployment of ease-of-use virtual environment on the Internet. One typical feature of clouds is its pool of easily accessible virtualized resources (such as hardware, platform or services) that can be dynamically reconfigured to adjust to a variable load (scale). Cloud systems usually do not provision […]
Similarity relevance scheme for protecting data in cloud computing
Cloud computing, a critical pattern for advanced data service, has became a necessary feasibility for data users to outsource data. Controversies on privacy, It is incessantly presented as outsourcing of sensitive information including emails, health history and personal photos is explosively expanding. Traditional SSE schemes enable users to securely retrieve the cipher text, but these […]
Predictive ACKs: Reducing Latency and Operational Cost in Cloud Computing
PACK (Predictive ACKs), traffic redundancy elimination (TRE) system, designed for cloud computing customers. In this paper, we present a novel receiver-based end-to-end TRE solution that relies on the power of predictions to eliminate redundant traffic between the cloud and its end-users. In this solution, each receiver observes the incoming stream and tries to match its […]
Skewness Minimization: Improving utilization of Cloud servers
In this paper, we present the design and implementation of an automated resource management system that achieves a good balance between the two goals i.e. Overload avoidance and Green computing. We develop a resource allocation system that can avoid overload in the system effectively while minimizing the number of servers used. . We introduce the […]
Secure data sharing for dynamic groups in the cloud
This paper proposes a secure multi-owner data sharing scheme. It implies that any user in the group can securely share data with others by the untrusted cloud. The proposed scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners. […]
Anonymous Location-based efficient routing protocol
In order to provide high anonymity protection (for sources, destination, and route) with low cost, this paper proposes an Anonymous Location-based and Efficient Routing proTocol (ALERT). ALERT dynamically partitions a network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non traceable anonymous route. Specifically, in each routing […]
Reserving room before encryption using Reversible Data Hiding
Reversible data hiding (RDH) in images is a technique, by which the original cover can be losslessly recovered after the embedded message is extracted. In the proposed method, we first empty out room by embedding LSBs of some pixels into other pixels with a traditional RDH method and then encrypt the image, so the positions […]
- « Previous Page
- 1
- …
- 7
- 8
- 9
- 10
- 11
- …
- 13
- Next Page »