Showing 49–60 of 207 results

  • COKE Crypto-Less Over-the-Air Key Establishment

    COKE Crypto-Less Over-the-Air Key Establishment

    0 out of 5
    4,500

    COKE Crypto-Less Over-the-Air Key Establishment Abstract? COKE Crypto-Less Over-the-Air Key Establishment. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ] Voice Conference Video On Demand *…

  • Collaboration- and Fairness-Aware Big Data Management in Distributed Clouds

    Collaboration- and Fairness-Aware Big Data Management in Distributed Clouds

    0 out of 5
    4,500

    Collaboration- and Fairness-Aware Big Data Management in Distributed Clouds Abstract? With the advancement of information and communication technology, data are being generated at an exponential rate via various instruments and collected at an unprecedented scale. Such large volume of data generated is referred to as big data, which now are revolutionizing all aspects of our…

  • Collaborative Task Execution in Mobile Cloud Computing Under a Stochastic Wireless Channel

    Collaborative Task Execution in Mobile Cloud Computing Under a Stochastic Wireless Channel

    0 out of 5
    4,500

    Investigates collaborative task execution between a mobile device and a cloud clone for mobile applications under a stochastic wireless channel. A mobile application is modeled as a sequence of tasks that can be executed on the mobile device or on the cloud clone. We aim to minimize the energy consumption on the mobile device while…

  • Community-Aware Opportunistic Routing in Mobile Social Networks

    Community-Aware Opportunistic Routing in Mobile Social Networks

    0 out of 5
    4,500

    Community-Aware Opportunistic Routing in Mobile Social Networks Abstract?Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with social characteristics. Recently, many social-aware algorithms have been proposed to address routing problems in MSNs. However, these algorithms tend to forward messages to the nodes with locally optimal social…

  • Compact DFA : Scalable Pattern Matchning Using Longest Prefix Match Solutions

    Compact DFA : Scalable Pattern Matchning Using Longest Prefix Match Solutions

    0 out of 5
    4,500

    Compact DFA : Scalable Pattern Matchning Using Longest Prefix Match Solutions Abstract?Compact DFA : Scalable Pattern Matchning Using Longest Prefix Match Solutions. A central component in all contemporary intrusion detection systems (IDSs) is their pattern matching algorithms, which are often based on constructing and traversing a deterministic finite automaton (DFA) that represents the patterns. While…

  • Cost-Based Optimization of Service Compositions

    Cost-Based Optimization of Service Compositions

    0 out of 5
    4,500

    Cost-Based Optimization of Service Compositions   Abstract? Cost-Based Optimization of Service Compositions. For providers of composite services, preventing cases of SLA violations is crucial. Previous work has established runtime adaptation of compositions as a promising tool to achieve SLA conformance. However, to get a realistic and complete view of the decision process of service providers,…

  • Android Application Online Projects

    Coverage Contribution Area based k-Coverage for Wireless Sensor Networks

    0 out of 5
    4,500

    Coverage Contribution Area based k-Coverage for Wireless Sensor Networks Abstract-Coverage is a primary metric for ensuring the quality of services (QoSs) provided by a wireless sensor network (WSN). In this paper, we focus on the k-coverage problem, which requires a selection of a minimum subset of nodes among the deployed ones such that each point…

  • Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.

    Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.

    0 out of 5
    4,500

    Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks.Wireless mesh networks (WMNs) have emerged as a flexible and low-cost network infrastructure, where heterogeneous mesh routers managed by different users collaborate to extend network coverage. This paper proposes a novel routing metric, Expected Forwarded Counter (EFW), and two further variants, to cope with the problem of…

  • CSR: Classi?ed Source Routing in DHT-Based Networks

    CSR: Classi?ed Source Routing in DHT-Based Networks

    0 out of 5
    4,500

    CSR: Classi?ed Source Routing in DHT-Based Networks Abstract-In recent years cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources. Distributed hash table (DHT) based networks have become increasingly important for ef?cient communication in large-scale cloud systems. Previous studies mainly focus on improving the performance such as latency, scalability…

  • DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks

    DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks

    0 out of 5
    4,500

    DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks Abstract? DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks. A masquerade attacker impersonates a legal user to utilize the user services and privileges. The semi-global alignment algorithm < Final Year Projects 2016 > is one of the most effective and ef?cient techniques to…

  • Decentralized robust spectrum allocation for cognitive radio wireless mesh networks

    Decentralized robust spectrum allocation for cognitive radio wireless mesh networks

    0 out of 5
    4,500

    Decentralized robust spectrum allocation for cognitive radio wireless mesh networks Abstract? Decentralized robust spectrum allocation for cognitive radio wireless mesh networks. During the last decade we have seen an explosive growth in the deployment of wireless networks in unlicensed frequency bands, mainly driven by the great success of the IEEE 802.11 standard. In addition to…

  • Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

    Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

    0 out of 5
    4,500

    Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach Abstract? Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach. In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the…

End of content

End of content