Search
Now showing items 1-10 of 67
Multi-Objective Security Hardening Optimisation for Dynamic Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ...
Empowering users of cloud computing on data confidentiality
(
IEEE
, 2014 , Conference Paper)
Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ...
The similarity-aware relational intersect database operator
(
Springer International Publishing
, 2014 , Conference Paper)
Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ...
A novel multi-hop body-To-body routing protocol for disaster and emergency networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ...
Group owner election in Wi-Fi direct
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported ...
An efficient instance hiding scheme
(
Association for Computing Machinery
, 2016 , Conference Paper)
Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
Green operator cooperation for radio frequency transmission minimization
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ...
Empirical performance evaluation of QUIC protocol for Tor anonymity network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
Robotic probe positioning system for structural health monitoring
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ...
An Interactive Visualization Web Solution for Electricity Consumption in Qatar
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ...