Showing 3325–3336 of 3682 results

  • STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

    STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

    0 out of 5
    5,500

    STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users Abstract? Location-based services are quickly becoming immensely popular. In addition to services based on users? current location, many potential services rely on users? location history, or their spatial-temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove…

  • STAR: SLA-Aware Autonomic Management of Cloud Resources

    STAR: SLA-Aware Autonomic Management of Cloud Resources

    0 out of 5
    4,500

    STAR: SLA-Aware Autonomic Management of Cloud Resources Abstract– Abstract?Cloud computing has recently emerged as an important service to manage applications efficiently over the Internet. Various cloud providers offer pay per use cloud services that requires Quality of Service (QoS) management to efficiently monitor and measure the delivered services through Internet of Things (IoT) and thus…

  • STAR: SLA-Aware Autonomic Management of Cloud Resources

    STAR: SLA-Aware Autonomic Management of Cloud Resources

    0 out of 5
    4,500

    STAR: SLA-Aware Autonomic Management of Cloud Resources Abstract– Abstract?Cloud computing has recently emerged as an important service to manage applications efficiently over the Internet. Variouscloud providers offer pay per use cloud services that requires Quality of Service (QoS) management to efficiently monitor and measure the delivered services through Internet of Things (IoT) and thus needs…

  • STARS: A Statistical Traffic Pattern Discovery System for MANETs

    STARS: A Statistical Traffic Pattern Discovery System for MANETs

    0 out of 5
    4,500

    STARS: A Statistical Traffic Pattern Discovery System for MANETs Abstract?STARS: A Statistical Traffic Pattern Discovery System for MANETs. Many anonymity enhancing techniques have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we show that MANETs are still vulnerable under passive statistical traffic…

  • STaRS: Simulating Taxi Ride Sharing at Scale

    STaRS: Simulating Taxi Ride Sharing at Scale

    0 out of 5
    4,500

    ?STaRS: Simulating Taxi Ride Sharing at Scale Abstract– As urban populations grow, cities face many challenges related to transportation, resource consumption, and the environment. Ride sharing has been proposed as an effective approach to reduce traffic congestion, gasoline consumption, and pollution. However, despite great promise, researchers and policy makers lack adequate tools to assess the…

  • Starting Any Applications Via Launcher In Android

    Starting Any Applications Via Launcher In Android

    0 out of 5
    6,500

    Starting Any Applications Via Launcher In Android Abstract? Android is a popular, free, open-source mobile platform that has taken the wireless world by storm. An innovative and open platform, Android is well positioned to address the growing needs of the mobile marketplace as it continues to expand beyond early adopters and purchasers of high-end smart…

  • Static Handwritten Signature Recognition using Discrete Random Transform and Combined Projection based Technique

    Static Handwritten Signature Recognition using Discrete Random Transform and Combined Projection based Technique

    0 out of 5
    4,500

    Static Handwritten Signature Recognition using Discrete Random Transform and Combined Projection based Technique Abstract? Static Handwritten Signature Recognition using Discrete Random Transform and Combined Projection based Technique. In this paper, we proposed Discrete Radon Transform (DRT) technique for feature extraction of static signature recognition to identify forgeries. Median filter has been introduced for noise cancellation…

  • Statistical Characterizations and Environment Modelling of Impacts of Water Quality.

    Statistical Characterizations and Environment Modelling of Impacts of Water Quality.

    0 out of 5
    4,500

    Statistical Characterizations and Environment Modelling of Impacts of Water Quality. Abstract?Water Maintains link between the five biomes and its make up the part of the biosphere. The Aquatic biome is mainly classified into fresh and marine water. The Aquatic biomes are largely classified into fresh water and marine. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=”…

  • Statistically Indifferent Quality Variation: An Approach for Reducing Multimedia Distribution Cost for Adaptive Video Streaming Services

    Statistically Indifferent Quality Variation: An Approach for Reducing Multimedia Distribution Cost for Adaptive Video Streaming Services

    0 out of 5
    4,500

    Automobile Spare Shop(Android App) Abstract-Forecasts predict that Internet traffic will continue to grow in the near future. A huge share of this traffic is caused by multimedia streaming. The quality of experience (QoE) of such streaming services is an important aspect and in most cases the goal is to maximize the bit rate which?in some…

  • Steganography Based Content Retrieval in Cloud Computing

    Steganography Based Content Retrieval in Cloud Computing

    0 out of 5
    4,500

    Steganography Based Content Retrieval in Cloud Computing Abstract-In a Cloud Security is updated for each and every day in an cloud environment the Security is updated for all type of cloud environments in our process focused on Cloud image Security In Recent years the some popular celebrities personal images are leaked from some social media…

  • Steganography encryption standard for android application

    Steganography encryption standard for android application

    0 out of 5
    6,500

    Steganography encryption standard for android application Abstract?Abstract Information (or data) hiding process embeds data into digital media for the purpose of security. Steganography is one such technique in which presence of secret message cannot be detected and we can use it as a tool for security purpose to transmit the confidential information in a secure…

  • Steganography Using Reversible Texture Synthesis

    Steganography Using Reversible Texture Synthesis

    0 out of 5
    4,500

    Steganography Using Reversible Texture Synthesis Abstract?Steganography Using Reversible Texture Synthesis. A novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image,which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography to conceal secret messages….

End of content

End of content