Search
Now showing items 11-20 of 1286
Fuzzy prediction for failed back surgery syndrome
(
Taylor and Francis Ltd.
, 2010 , Article)
In this article a new strategy is presented that can be used by neurophysicians, neurosurgeons, and orthopedic surgeons to predict patients' health after an operative procedure on the vertebral column just by analyzing the ...
Security-aware service composition for end users of small enterprises
(
IOS Press
, 2010 , Article)
This paper focuses on the service composition based on security properties of services from an end user perspective. End users are usually not expert in computer security, but expert users of computer software. They typically ...
Establishing trust in cloud computing
(
IEEE Computer Society
, 2010 , Article)
How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud ...
Maximizing energy efficiency for loss tolerant applications: The packet buffering case
(
IEEE
, 2013 , Conference Paper)
Energy efficient communication has emerged as one of the key areas of research due to its impact on industry and environment. Any potential degree of freedom (DoF) available in the system should be exploited smartly to ...
Security and privacy in emerging networks: Part 1 [Guest Editorial]
(
IEEE
, 2015 , Article)
With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...
An energy-efficient distributed clustering algorithm for heterogeneous WSNs
(
Springer International Publishing
, 2015 , Article)
Wireless sensor networks (WSNs) were envisaged to become the fabric of our environment and society. However, they are yet unable to surmount many operational challenges such as limited network lifetime, which strangle their ...
An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Underwater acoustic sensor networks (UASNs) have been widely used in many applications where a variable number of sensor nodes collaborate with each other to perform monitoring tasks. A trust model plays an important role ...
A Fatigue Measuring Protocol for Wireless Body Area Sensor Networks
(
Springer New York LLC
, 2015 , Article)
As players and soldiers preform strenuous exercises and do difficult and tiring duties, they are usually the common victims of muscular fatigue. Keeping this in mind, we propose FAtigue MEasurement (FAME) protocol for ...
Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
(
IEEE
, 2015 , Article)
Quality of service (QoS) for a network is characterized in terms of various parameters specifying packet delay and loss tolerance requirements for the application. The unpredictable nature of the wireless channel demands ...
Implementation and Analysis of Reward Functions under Different Traffic Models for Distributed DSA Systems
(
IEEE
, 2015 , Article)
In this paper, we implement and analyze a resource allocation protocol for distributed dynamic spectrum allocation (DSA) systems. The DSA protocol is a learning-based protocol that allows secondary users (SU) to exploit ...