Search
Now showing items 3731-3740 of 3768
Multi-cloud distribution of virtual functions and dynamic service deployment: OpenADN perspective
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Network Function Virtualization (NFV) and Service Chaining (SC) are novel service deployment approaches in the contemporary cloud environments for increased flexibility and cost efficiency to the Application Service Providers ...
Wireless application deploying cell broadcast, and bulk SMS/MMS
(
International Business Information Management Association, IBIMA
, 2009 , Conference Paper)
Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the ...
MB-C: Check-in mobile application using barcodes
(
International Business Information Management Association, IBIMA
, 2008 , Conference Paper)
This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ...
THE EFFECTIVENESS OF PROJECT-ORIENTED PROBLEM-BASED LEARNING (POPBL) AS A PEDAGOGICAL APPROACH IN PROMOTING CRITICAL THINKING AMONG EFL UNDERGRADUATES IN A PRIVATE UNIVERSITY IN KUWAIT
(
Qatar University Young Scientists Center - Qatar University
, 2024 , Conference Paper)
In today's interconnected world, proficiency in language and cultural knowledge is crucial for effective global communication, surpassing geographical boundaries. This research investigates the impact of Problem-Oriented ...
Identifying contextual properties of software architecture in cloud computing
(
IEEE
, 2011 , Conference Paper)
This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ...
Selecting Web services with security compliances: A managerial perspective
(
dblp computer science bibliography
, 2007 , Conference Paper)
This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ...
Highlight on cryptocurrencies mining with CPUs and GPUs and their benefits based on their characteristics
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Nowadays cryptography and their technologies have been with us for a long time. This field of science is developing day by day. Blockchain has come a long way since the birth of its first application. This application is ...
Security-oriented service composition and evolution
(
IEEE
, 2006 , Conference Paper)
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ...
Full-Scale Seawater Reverse Osmosis Desalination Plant Simulator
(
Elsevier
, 2020 , Conference Paper)
Reverse Osmosis (RO) is an evolving membrane-based technology for water desalination that started to gain increased popularity in the light of the increased global water demand due its high efficiency and low carbon ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...