بحث بسيط
السجلات المعروضة 21 -- 30 من 690
Multi-Objective Security Hardening Optimisation for Dynamic Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ...
Online risk assessment and prediction models for Autonomic Cloud Intrusion srevention systems
(
IEEE
, 2014 , Conference Paper)
The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for cloud tenants or customers and introduces an additional layer that itself must be completely configured and ...
MIMO vehicle to vehicle channels: An experimental study
(
IEEE
, 2014 , Conference Paper)
In this paper, a platform for measuring the impulse response of wireless multiple-input-multiple-output (MIMO) vehicle-to-vehicle (V2V) channels is presented. The platform is developed using Rice University Wireless ...
PLATE workbench: A PBL authoring tool
(
Springer International Publishing
, 2014 , Conference Paper)
For most practitioners it is problematic to design an online or blended problem-based learning (PBL) unit within an increasingly complex learning context. This paper presents the development and application of a PBL authoring ...
Overcoming user selfishness in DSA systems through credit-based resource allocation
(
IEEE
, 2014 , Conference Paper)
We propose a credit-based resource allocation technique for wireless systems with dynamic spectrum access (DSA) capability, such as multichannel wireless sensor networks. The proposed technique is robust against selfish ...
A fast method for approximate registration of whole-slide images of serial sections using local curvature
(
SPIE
, 2014 , Conference Paper)
We present a method for fast, approximate registration of whole-slide images (WSIs) of histopathology serial sections. Popular histopathology slide registration methods in the existing literature tend towards intensity-based ...
The similarity-aware relational intersect database operator
(
Springer International Publishing
, 2014 , Conference Paper)
Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ...
RSU cloud and its resource management in support of enhanced vehicular applications
(
IEEE
, 2014 , Conference Paper)
We propose Roadside Unit (RSU) Clouds as a novel way to offer non-safety application with QoS for VANETs. The architecture of RSU Clouds is delineated, and consists of traditional RSUs and specialized micro-datacenters and ...
ConProve: A conceptual prover system
(
IEEE
, 2014 , Conference Paper)
ConProve is an automated prover for propositional logic. It takes, as an input, a set of propositional formulas and proves whether a goal holds or not. ConProve converts each formula to its corresponding Truth Table Binary ...
Effectiveness of combined time-frequency imageand signal-based features for improving the detection and classification of epileptic seizure activities in EEG signals
(
IEEE
, 2014 , Conference Paper)
This paper presents new time-frequency (T-F) features to improve the detection and classification of epileptic seizure activities in EEG signals. Most previous methods were based only on signal features derived from the ...