Showing 1069–1080 of 1348 results

  • Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior

    0 out of 5
    4,500

    Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and…

  • Resolving Multi-Party Privacy Conflicts in Social Media

    0 out of 5
    5,500

    Resolving Multi-Party Privacy Conflicts in Social Media Abstract? Items shared through Social Media may affect more than one user?s privacy?e.g., photos that depict multiple users, comments that mention multiple users, events in which multiple users are invited, etc. The lack of multi-par ty privacy management support in current mainstream Social Media infrastructures makes users unable…

  • Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory

    0 out of 5
    4,500

    Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory Abstract?Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory, In this paper, we propose a method of constructing a virtual coordinate system (ABVCap) in wireless sensor networks where location information is not available. A routing protocol based on ABVCap virtual…

  • Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory

    0 out of 5
    5,500

    Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory Abstract? Virtualization of resources on the cloud offers a scalable means of consuming services beyond the capabilities of small systems. In a cloud that offers infrastructure such as processor, memory, hard disk, etc., a coalition of virtual machines formed by grouping two or…

  • Resource Selection for Tasks with Time Requirements Using Spectral Clustering

    0 out of 5
    4,500

    Resource Selection for Tasks with Time Requirements Using Spectral Clustering Abstract?Resource selection and task assignment are basic operations in distributed computing environments, like the grid and the cloud, where tasks compete for resources. The decisions made by the corresponding algorithms should be judged based not only on metrics related to user satisfaction, such as the…

  • Resource Selection for Tasks with Time Requirements Using Spectral Clustering

    0 out of 5
    4,500

    Resource Selection for Tasks with Time Requirements Using Spectral Clustering Abstract?Resource Selection for Tasks with Time Requirements Using Spectral Clustering Resource selection and task assignment are basic operations in distributed computing environments, like the grid and the cloud, where tasks compete for resources. The decisions made by the corresponding algorithms should be judged based not…

  • Response Time Based Optimal Web Service Selection

    0 out of 5
    4,500

    Response Time Based Optimal Web Service Selection Abstract? Response Time Based Optimal Web Service Selection. Selecting an optimal web service among a list of functionally equivalent web services still remains a challenging issue. For Internet services, the presence of low-performance servers, high latency or overall poor service quality can translate into lost sales, user frustration,…

  • Resume Tracking

    0 out of 5
    4,500

    Resume Tracking Abstract?Resume Tracking. Not more than 1 page. Remember the interviewer reads the resume in 10 seconds. Keep the sentences short. Simple < Final Year Projects > PDF in Times New Roman font that can be read on any computer. Reverse order. List your present and then your past. Be specific about your company…

  • Rethinking Security in the Era of Cloud Computing

    0 out of 5
    4,500

    Rethinking Security in the Era of Cloud Computing Abstract– Cloud computing has emerged as a dominant platform for computing for the foreseeable future, resulting in an ongoing disruption to the way we build and deploy software. This disruption offers a rare opportunity to integrate new approaches to computer security. In this paper we outline a…

  • Retrieval Of Textual And Non-Textual Information In Cloud

    0 out of 5
    4,500

    Retrieval Of Textual And Non-Textual Information In Cloud   Abstract?With the advent of the Internet there is an exponential growth in multimedia content in various databases,which has a major issue in effective access and etrieval of both textual and non-textual resources.< Final Year Project >To resolve this problem information is stored in the cloud environment.From…

  • Reverse Keyword Search for Spatio-Textual Top-kQueries in Location-Based Services

    0 out of 5
    4,500

    Reverse Keyword Search for Spatio-Textual Top-kQueries in Location-Based Services Abstract? Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services. Spatio-textual queries retrieve the most similar objects with respect to a given location and a keyword set. Existing studies mainly focus on how to efficiently find the top-kresult set given a spatio- extual query. Nevertheless,…

  • Reversible Data Hiding in Encrypted Image with Distributed Source Encoding

    0 out of 5
    4,500

    Reversible Data Hiding in Encrypted Image with Distributed Source Encoding Abstract? A novel scheme of reversible data hiding (RDH) in encrypted images using distributed source coding DSC . < Final Year Projects 2016 > After the original image is encrypted by the content owner using a stream cipher, the data-hider compresses a series of selected…

End of content

End of content