Weighted Sum-Rate Maximization for MIMO Downlink Systems Powered by Renewables Abstract? Optimal resource management for smart grid powered multi-input multi-output (MIMO) systems is of great importance for future green wireless communications. A novel framework is put forth to account for the stochastic renewable energy sources (RES), dynamic energy prices, as well as random wireless channels….
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively Abstract-Ciphertext-policy attribute-based encryption (CP-ABE) has been proposed to enable fine-grained access control on encrypted data for cloud storage service. In the context of CP-ABE, since the decryption privilege is shared by multiple users who have the same attributes, it…
Word Segmentation Method for Handwritten Documents based on Structured Learning Abstract? Word Segmentation Method for Handwritten Documents based on Structured Learning. Segmentation of handwritten document imagesinto text-lines and words is an essential task for optical character recognition. However, since the features of handwritten document are irregular and diverse depending on the person, it is considered…
Workflow Transformation for Real-Time Big Data Processing Abstract?Abstract With the explosion of big data, processing and analyzing large numbers of continuous data streams in real-time,such as social media stream, sensor data streams, log streams,stock exchanges streams, etc., has become a crucial requirement for many scientific and industrial applications in recent years.Increased volume of streaming data…
Workload modeling for resource usage analysis and simulation in cloud computing Abstract-In the first place, workload modeling enables performance analysis and simulation of cloud resource management policies, which allows cloud providers to improve their systems? Quality of Service (QoS) and researchers to evaluate new policies without deploying expensive large scale environments. However, workload modeling is…
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems Abstract?Wormhole Attack Detection Algorithms in Wireless Network Coding Systems. Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that…
Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks Abstract-Today search engines are tightly coupled with social networks, and present users with a double-edged sword: they are able to acquire information interesting to users but are also capable of spreading viruses introduced by hackers. It is challenging to characterize how a…