Search
Now showing items 1-10 of 109
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems
(
Elsevier
, 2015 , Article)
Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ...
Multi-Objective Security Hardening Optimisation for Dynamic Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ...
Empowering users of cloud computing on data confidentiality
(
IEEE
, 2014 , Conference Paper)
Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ...
The similarity-aware relational intersect database operator
(
Springer International Publishing
, 2014 , Conference Paper)
Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ...
A novel multi-hop body-To-body routing protocol for disaster and emergency networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ...
Group owner election in Wi-Fi direct
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported ...
An efficient instance hiding scheme
(
Association for Computing Machinery
, 2016 , Conference Paper)
Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
Green operator cooperation for radio frequency transmission minimization
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ...
Multi-moth flame optimization for solving the link prediction problem in complex networks
(
Springer Verlag
, 2019 , Article)
Providing a solution for the link prediction problem attracts several computer science fields and becomes a popular challenge in researches. This challenge is presented by introducing several approaches keen to provide the ...
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
(
Academic Press Inc.
, 2017 , Article)
Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ...