Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space. Due to the unique network characteristics, designing a misbehavior detection scheme […]
Ongoing Authorization Model for Cloud Computing
This paper proposed an Authorization Model for Cloud Computing. The proposed model aims to extend the UCONABC ongoing authorization model, providing resilience to the reevaluation of usage policies. Resilience means providing the model with the ability to deal with some individual user authorization attributes exceeding, while the SLA for the respective consumption service is under […]
Tail Theft Dual Queue Scheduling Algorithm for Energy Saving
This paper proposes TailTheft, a scheme that leverages the tail time for batching and prefetching to save energy. TailTheft provides a customized application programming interface (API) for applications. Applications indicate the type of request, the time that can be delayed or prefetched by calling the TailTheft API, as well as the type of action taken […]
KAC: Key Aggregate cryptosystem – A New Data Sharing Model
This paper proposes a new public key encryption called key aggregate cryptosystem (KAC). In KAC, the data owner establishes the public system parameter via Setup and generates a public/master-secret key pair via KeyGen. Messages can be encrypted via Encrypt by anyone who also decides what ciphertext class is associated with the plaintext message to be […]
ToF: Transformation based Optimizations in Cloud
we propose ToF, a transformation-based workflow optimization system to address the performance and monetary cost optimizations in the cloud. We develop and deploy the workflow optimization system in real cloud environments, and demonstrate its effectiveness and efficiency with extensive experiments. ToF has two major components for performance and cost optimizations: transformation model and planner. The […]
Video File Restoration Using Video Codec Specifications
This paper proposes a technique to restore the video data on a frame-by frame basis from its corrupted versions where the video data has been significantly fragmented or partly overwritten in the storage media. The proposed technique restores the video data in a frame unit, not in a file unit. The proposed method restores a […]
MCA-based DoS attack detection system
This paper proposed a new multivariate correlation analysis (MCA) based detection system to protect online services against Denial of Service (DoS) attacks. It is powered by the triangle-area based MCA technique and the anomaly-based detection technique. The detection process consists of three major steps: Basic Feature generation for network traffic records, multivariate correlation analysis, and […]
Locx A Novel Approach to Achieving User Privacy in LBS
In this paper, we propose LocX (Location to index mapping, a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications. we can partition location data based on users’ social groups, and then perform transformations on the location coordinates before storing them on untrusted servers. A user knows the transformation keys […]
Secure Deduplication Systems – An Hybrid Approach
In this paper, aiming at efficiently solving the problem of deduplication with differential privileges in cloud computing, we consider a hybrid cloud architecture consisting of a public cloud and a private cloud. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud. A new […]
Foveated Video Quality Metric based on Wavelet Distortion Visibility
In this paper we propose an FR attention driven foveated video quality (AFViQ) metric. A perceptual based foveal imaging model consisting of an improved video attention model and an advanced fixation prediction approach by simulating the essential functionality of eye movement; ii) an accurate video quality metric by integrating the foveal imaging model into wavelet-based […]
- « Previous Page
- 1
- …
- 8
- 9
- 10
- 11
- 12
- …
- 15
- Next Page »