Showing 2041–2052 of 2166 results

  • Toward Trustworthy Coordination of Web Services Business Activities.

    Toward Trustworthy Coordination of Web Services Business Activities.

    0 out of 5
    4,500

    Toward Trustworthy Coordination of Web Services Business Activities.We present a lightweight Byzantine fault tolerance (BFT) algorithm, which can be used to render the coordination of web services business activities (WS-BA) more trustworthy. The lightweight design of the BFT algorithm is the result of a comprehensive study of the threats to the WS-BA coordination services and…

  • Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud Platform

    Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud Platform

    0 out of 5
    4,500

    Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud Platform   Abstract? Ubiquitous healthcare services are becoming more and more popular, especially under the urgent demand of the global aging issue. Cloud computing owns the pervasive and on-demand service-oriented natures, which can fit the characteristics of healthcare services very well. However, the abilities in dealing…

  • Towards a Trust Management System for Cloud Computing

    Towards a Trust Management System for Cloud Computing

    0 out of 5
    4,500

    Towards a Trust Management System for Cloud Computing   Abstract? Towards a Trust Management System for Cloud Computing. Cloud computing provides cost-efficient opportunities for enterprises by offering a variety of dynamic, < Final Year Projects > scalable, and shared services. Usually, cloud providers provide assurances by specifying technical and functional descriptions in Service Level Agreements…

  • Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

    Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

    0 out of 5
    4,500

    Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service Abstract?Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service. Collection and analysis of various logs < Final Year Projects 2016 > e.g., process logs, network logs are fundamental activities in computer forensics. Ensuring the security of the activity logs is therefore crucial to ensure reliable forensics investigations. However,…

  • Towards Detecting Compromised Accounts on Social Networks

    Towards Detecting Compromised Accounts on Social Networks

    0 out of 5
    3,500

    Towards Detecting Compromised Accounts on Social Networks Abstract? Towards Detecting Compromised Accounts on Social Networks. Compromising social network accounts has become a pro?table course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base. The impacts…

  • Towards Differential Query Services in Cost-Efficient Clouds

    Towards Differential Query Services in Cost-Efficient Clouds

    0 out of 5
    4,500

    Towards Differential Query Services in Cost-Efficient Clouds   Abstract?Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs.< Final Year Projects > In this paper, we…

  • Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks

    Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks

    0 out of 5
    4,500

    Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks Abstract? We address how to design a distributed movement strategy for mobile collectors, which can be either physical mobile agents or query/collector packets periodically launched by the sink, to achieve successful data gathering in wireless sensor networks. Formulating the problem as general random…

  • Towards Effective Bug Triage with Software Data Reduction Techniques

    Towards Effective Bug Triage with Software Data Reduction Techniques

    0 out of 5
    4,500

    Towards E ective Bug Triage with Software Data Reduction Techniques Abstract? Towards Effective Bug Triage with Software Data Reduction Techniques. Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease…

  • Towards Effective Bug Triage with Software Data Reduction Techniques

    Towards Effective Bug Triage with Software Data Reduction Techniques

    0 out of 5
    4,500

    Towards Effective Bug Triage with Software Data Reduction Techniques Abstract? Towards Effective Bug Triage with Software Data Reduction Techniques. Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the…

  • Towards Information Diffusion in Mobile Social Networks

    Towards Information Diffusion in Mobile Social Networks

    0 out of 5
    4,500

    Towards Information Diffusion in Mobile Social Networks Abstract? Towards Information Diffusion in Mobile Social Networks. The emerging of mobile social networks opens opportunities for viral marketing. However, before fully utilizing mobile social networks as a platform for viral marketing, many challenges have to be addressed. In this paper, we address the < Final Year Projects...

  • Towards Online Shortest Path

    Towards Online Shortest Path

    0 out of 5
    4,500

    Towards Online Shortest Path Abstract?Towards Online Shortest Path, The online shortest path problem aims at computing the shortest path based on live traffic circumstances. This is very important in modern car navigation systems as it helps drivers to make sensible decisions. To our best knowledge, there is no efficient system/solution that can offer affordable costs…

  • Towards Online Shortest Path Computation

    Towards Online Shortest Path Computation

    0 out of 5
    4,500

    Towards Online Shortest Path Computation   Abstract?Towards Online Shortest Path Computation. The online shortest path problem aims at computing the shortest path based on live traffic circumstances. This is very important in modern car navigation systems as it helps drivers to make sensible decisions. To our best knowledge, there is no efficient system/solution that can…

End of content

End of content